Action not permitted
Modal body text goes here.
cve-2008-0960
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30615" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30802" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30574" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30615" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30802" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30574" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2008-0960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380", "refsource": "CONFIRM", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30615" }, { "name": "http://support.apple.com/kb/HT2163", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30648" }, { "name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "refsource": "MLIST", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "name": "http://www.ocert.org/advisories/ocert-2008-006.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30802" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=833770", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30574" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2008-0960", "datePublished": "2008-06-10T18:00:00", "dateReserved": "2008-02-25T00:00:00", "dateUpdated": "2024-08-07T08:01:40.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-0960\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2008-06-10T18:32:00.000\",\"lastModified\":\"2018-10-30T16:25:36.577\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n SNMPv3 HMAC en (1) Net-SNMP versi\u00f3n 5.2.x anterior a 5.2.4.1, versi\u00f3n 5.3.x anterior a 5.3.2.1 y versi\u00f3n 5.4.x anterior a 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series versi\u00f3n 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (tambi\u00e9n se conoce como Network Appliance) ONTAP versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versi\u00f3n anterior a 16.2; (7) m\u00faltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall versi\u00f3n 3.1.0 y posterior y SIParator versi\u00f3n 3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent versi\u00f3n 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticaci\u00f3n SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":10.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CAC7FBF-2493-42CA-9B23-20AF09F0DDA8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE64E4C4-BACE-404F-966D-415976781DC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"377F951F-C2D8-441D-A532-F62E23937F94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A3A284-36A9-4E8C-815D-6E2FE4C158DF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5823F33-7FB3-465B-8017-1866D9EF3AA6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*\",\"matchCriteriaId\":\"94870E9E-C883-4051-8854-CDE0AE7A64B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A4AFC06-85C5-4AD0-A409-27F9AF398D7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB593071-BB5A-47AD-B9C6-59D2010F6280\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*\",\"matchCriteriaId\":\"74382B2D-E9A6-453D-9C07-F959EAB4C075\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D93383-BD5A-4052-B724-055F6FCFC314\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1E3C39-163D-4A99-AC96-2EE388305000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*\",\"matchCriteriaId\":\"90710000-F963-4F36-9EE1-C3CE1CECDCA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F4F8B9E-B2AB-4545-8ACF-8F03E636E842\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E2D6402-D2AF-4817-8A46-1FA9B17B720C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BB5494-735D-424B-8B41-2FAECE1A7AD4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6178BC-9741-4FC1-87DA-A5407B3A4F40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A419BD7-6345-43D8-B69C-2255E2EF6FD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*\",\"matchCriteriaId\":\"B472DEEE-148A-46B4-BCBC-0A9F62F38B31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*\",\"matchCriteriaId\":\"23305EBA-11D5-417E-823E-39D0D052839D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"95418AD2-FB85-4E20-B874-D82DDF88BC91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D1B81D-95E4-4945-94F2-C36FD7C0DC55\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*\",\"matchCriteriaId\":\"452FF154-F6C0-4BC4-969E-1D49AA3CCE49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB6C57C-8805-443F-8ACE-83DAA48878CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*\",\"matchCriteriaId\":\"554C9611-55F1-40AF-9862-7E902D5CE1D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*\",\"matchCriteriaId\":\"F89C185A-D3B3-4F5F-9249-F8EE89E8DD04\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB0B55E-3579-4929-862F-C5FF9F796AE1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8E34D3-0BCB-4D19-A41C-0375941E1B21\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*\",\"matchCriteriaId\":\"09CBD68E-2A5C-43DF-9AD6-DE07815821B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*\",\"matchCriteriaId\":\"01393D91-ED1D-460D-8621-10260F0CBDD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB2FF53-5991-4264-B5CC-D1E45460BFCE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE94EA2-E0CC-4760-94A8-DE56C8181F74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*\",\"matchCriteriaId\":\"929836AD-8128-4174-872D-B9638B54611C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED5B53D-930D-477E-A0F6-76167AE67641\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*\",\"matchCriteriaId\":\"84983F6A-64F6-4720-9291-FC84CA10EE25\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A60117-E4D1-4741-98A2-E643A26616A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*\",\"matchCriteriaId\":\"156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E90E83-1732-4BEF-BC5B-401769DC8880\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*\",\"matchCriteriaId\":\"51679B26-DF28-4E41-9801-E1599F250FFD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*\",\"matchCriteriaId\":\"E989900F-BE66-47E4-9A1B-11B9785F89BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A01B7E-8231-4001-A340-31CE66474FDA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC62D3B-A287-4DED-A44D-3351452D4A55\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*\",\"matchCriteriaId\":\"687E91FF-957E-449F-BDD6-85AA59E1E0D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79528F96-FD42-4A76-82EE-4B1324D53B5F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D626B494-6210-4F74-8D17-BA480B6665C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B6315D-7BEF-419F-9B93-3CF669E986D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB31FAC-D720-4BF1-BFCC-0A9B714E292A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904CA41E-8168-41DE-AE84-941962A7BB71\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D69F8FA-D58A-4F53-86D8-A20C73E9B299\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD331C50-DB93-4001-B56A-C1012F894CDF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75538529-611A-43B5-AC4D-089C4E2E2ACC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F992D03D-1DB8-44C1-B59D-1C09A32A2C91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8BC298-4AF9-4281-9AD9-0D8F621E46B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2FE436B-2117-4FB4-B550-8454848D1D58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D2BD63-C110-4E89-B239-4A59E20AB78E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E5FFB6-861D-4F91-B3C9-C5E57DDD25C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD3BD3D-767D-483D-9FFE-D23AA2E228E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6762126F-55E4-4963-99F5-206A46979E7C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1945B97A-8276-4EE2-8F76-5F0C0956DF18\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8CA81F-2AB6-45F8-8AAE-BF6A7EDA73D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2452913-0513-46BB-A52E-8FA12D77B570\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D967624-23B1-48BB-91DB-1E1C18AAAD85\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18CCF3B9-CA7D-4D37-BD2C-1B74586B98A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0AB8C2-EE95-48AA-98B7-B6ED40494A0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77930529-89BE-463D-8259-3D67D153284A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"743DEB17-3BE3-4278-A54B-2CE547DB9F31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DCAF8C2-0E4E-4474-BD1E-F28A6EAEF8F8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2BCA127-F5F3-418F-890D-6B1C03019590\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5A2C2F-ABF4-46B0-80AB-867B97AE5237\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE83150C-456E-462A-A0F1-ED8EAD60D671\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF5B2431-335C-461B-B07F-88267EA71DCD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DBA8E67-021A-4D07-94B9-943A8E1C4468\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"905D1F04-CDFD-4BAD-8939-5ABC70A874E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00878E69-2721-43E3-A853-D3DCFE5C258D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C51799BB-D931-436C-8C94-558956AC880A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1ACC549-B5AF-4F5C-A3FE-257AA6D80C7A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D498D406-A453-4119-BBA1-4709CF5862AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D68555E-BEB9-4F1E-8D6D-C313FB501523\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B44A0D4-3020-414B-81D7-679E8441E182\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*\",\"matchCriteriaId\":\"B76A8BD4-E53F-49A6-946B-6E672DD0419C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C6B46B-13E2-4DA4-9EF2-007893034269\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1C501EB-CF9F-437D-A7C0-2A12F1D5E171\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538FE81A-2FD9-4A7C-AEC7-8FCE98DADBE0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D3471D-6267-4481-8BBD-BFC106E8F30B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13FB3C8A-87D3-4601-BD97-2B9F9FA8CA47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0292228-80D8-4BA4-8662-698D7003D7D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFD21CF-CC38-477F-A78B-10CFEFF81E0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522C9080-86A6-40A8-905C-73187DAF83F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C1B7A18-F230-44D4-801E-8284085CA1DF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E62CC4C-89A7-4594-BDD8-394211889220\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E152F995-BCD2-4725-A47C-1A5E7D6B9005\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E38404-ED69-4B0E-A035-2AF5E0649CC1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90F0A06-A634-4BD0-A477-90BD3384B7D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"346E0D1B-CF9E-48BC-AE7A-F8CEF09F6741\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0123D2ED-3983-45D3-B54A-3E75FCE99C6D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66CA6C29-1DF1-46E3-BDCA-9ED72D3E6731\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50E974E-87F5-45A2-88BA-B1E4913E3DAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4AB25CC-BB96-4675-98D7-C5FF30C24014\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7C95AD-3D5F-458B-A761-5D7779FEA327\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E4A3F6-5D89-47D0-84AD-601682399D8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C700A36D-5FB4-475D-BE85-74511830870A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02060365-1D67-4611-8D79-B9FC354EBF99\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194BD880-F672-4492-8356-B14C8DA8C2DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D769FC-3081-48F8-BBF1-3964F3F8B569\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A966DB26-8A52-4F4D-9C0E-8A8719A195AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6675DF0-963A-4091-9786-7CE3337EE47E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A94931-8584-4021-A5BB-83FF22D54955\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F06FB120-9BB3-4363-B2A2-A3475993FDFD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8229DE3A-B9CB-44FF-8409-51E09DDED479\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAD7A89-294A-45DA-B5F5-C69F7FCC4A5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2699E7A6-7B3A-4C4C-9472-B8B6B547624D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D913348F-351C-4D78-A0AA-27B355D52235\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E88A46-CEC7-46D5-9697-232E18531FD5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F16B8D0-81F5-4ECE-8276-EC30DDCCE1A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ECFBAFE-9267-469A-A97F-F716969B247C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F839C7-7B33-4BF6-9ACF-76F32F5D7C72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1559E6-E7B6-4B5B-8841-CF502E05BA46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F041246F-5B7F-4F63-9E81-02465C9062C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB78013-DEE9-438E-ABD1-5E3D932177BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77447C3-AA72-4CAB-A0B1-0883D41AD064\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"473038C0-1644-4FF2-A1DA-BCB8A7CD1CA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C3F04F-7581-4DCA-970D-9FCBB56EA724\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ABF04A7-8230-4AB9-8D66-DF1463037823\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC205E36-7027-4A9B-8574-9BB9C68007A5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C55DD7-986A-4AB6-8F61-5A5D26531011\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84DDD7E4-D5D7-4341-9482-2B918306578D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14A3C59C-6A3D-477B-B425-1C085D6951E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31AA57F4-5023-4333-9F19-C9D362E8E495\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063034FF-0AB8-4D78-9822-0DCA9657C853\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67477EC7-363E-45B5-BA53-1A4E9FB20CDE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E11F95-E635-465C-BD7F-5F7E9192DEAC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F145F0-573E-4CBC-AB69-3B77D6F9A540\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DA7D86-8845-43CA-80DC-3D794322CB28\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD34FEB-7956-44AE-A510-2E5F9EF61651\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DEF5098-3791-4CEB-A436-2809A4385D27\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D895880-FB98-4472-A164-458CE086F339\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7912AA3-0469-479E-9C5A-53F20E504956\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8677C6C8-39CA-492A-A196-9DFAF892120C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51FA6F2A-8444-4BB2-B7F2-B97AEFFF9E27\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E46CAD-0032-4CD6-AA2A-871E1DFC3A35\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22CE55DE-00CA-4F87-9CA0-80A360E332FA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63DC81FA-A6B4-41DC-8097-8944D06A2451\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB87853E-CAFF-48D8-9C56-A2DE325235D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E35451-BEE3-412A-8706-5522C00BE1DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E599E0CE-CCB7-4A30-8AA9-45BBC11AFEC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F45326B3-CC4E-4C3A-9819-28936A0432F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDBF1A78-7190-4326-84BD-C18CC354DA38\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97FFBA0-2E80-40EF-A4AC-F26D3490371E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A442F5B-5A1A-4CD0-B693-851FFB917E5D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"074BCB70-AD66-4141-9DD3-9DE73BDCB0F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"646BF70F-CB7B-48E3-8563-E089E1CECD11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD34A7B-508C-45F2-8725-FE42398D3652\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2785732-A5C7-434E-B45D-13138B574F45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989A4E8A-F23D-4BF5-B860-FB7B04A1CE56\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07E1241-24BE-48D3-B737-56B2AAA3AF64\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB751FD-CCCA-4131-A24F-65DEF1128B26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D106F4E4-4B41-4002-8C34-6A9C3A0FF640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863583DC-DD93-46DC-BA06-0B838CDB2565\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D50E1B4-A64E-45D5-8A44-947DE7B8AAD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5F1A8F-5ED9-4ED0-A336-A0E4A439E6F2\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.ingate.com/pipermail/productinfo/2008/000021.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0528.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/30574\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30596\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30612\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/30615\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30626\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30647\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30648\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30665\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30802\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31334\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31351\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31467\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31568\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32664\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33003\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35463\",\"source\":\"cret@cert.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200808-02.xml\",\"source\":\"cret@cert.org\"},{\"url\":\"http://securityreason.com/securityalert/3933\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=833770\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://support.apple.com/kb/HT2163\",\"source\":\"cret@cert.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1663\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/878044\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7ETS87\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:118\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-006.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/06/09/1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0529.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/493218/100/0/threaded\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/497962/100/0/threaded\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/bid/29623\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1020218\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-685-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-162A.html\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0013.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0017.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1787/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1788/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1797/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1800/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1801/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1836/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1981/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2361\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2971\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1612\",\"source\":\"cret@cert.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=447974\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.exploit-db.com/exploits/5790\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html\",\"source\":\"cret@cert.org\"}]}}" } }
rhsa-2008_0529
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated net-snmp packages that fix a security issue are now available for\nRed Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Simple Network Management Protocol (SNMP) is a protocol used for\nnetwork management.\n\nA flaw was found in the way Net-SNMP checked an SNMPv3 packet\u0027s Keyed-Hash\nMessage Authentication Code (HMAC). An attacker could use this flaw to\nspoof an authenticated SNMPv3 packet. (CVE-2008-0960)\n\nA buffer overflow was found in the Perl bindings for Net-SNMP. This could\nbe exploited if an attacker could convince an application using the\nNet-SNMP Perl module to connect to a malicious SNMP agent. (CVE-2008-2292)\n\nAll users of net-snmp should upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0529", "url": "https://access.redhat.com/errata/RHSA-2008:0529" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "447262", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447262" }, { "category": "external", "summary": "447974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0529.json" } ], "title": "Red Hat Security Advisory: net-snmp security update", "tracking": { "current_release_date": "2024-11-22T02:03:48+00:00", "generator": { "date": "2024-11-22T02:03:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0529", "initial_release_date": "2008-06-10T14:07:00+00:00", "revision_history": [ { "date": "2008-06-10T14:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-06-10T10:09:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:03:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS EUS (v. 4.5)", "product": { "name": "Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.5::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES EUS (v. 4.5)", "product": { "name": "Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.5::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "product": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "product": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "product": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "product": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "product": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "product": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.1.ia64", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.1.ia64", "product_id": "net-snmp-1:5.3.1-24.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.24.ia64", "product": { "name": "net-snmp-0:5.0.9-2.30E.24.ia64", "product_id": "net-snmp-0:5.0.9-2.30E.24.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64", "product_id": "net-snmp-perl-0:5.0.9-2.30E.24.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64", "product_id": "net-snmp-libs-0:5.0.9-2.30E.24.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64", "product_id": "net-snmp-devel-0:5.0.9-2.30E.24.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64", "product_id": "net-snmp-utils-0:5.0.9-2.30E.24.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "product": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "product": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "product": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "product": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "product": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "product": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.1.i386", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.1.i386", "product_id": "net-snmp-1:5.3.1-24.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.24.i386", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.i386", "product_id": "net-snmp-libs-0:5.0.9-2.30E.24.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.24.i386", "product": { "name": "net-snmp-0:5.0.9-2.30E.24.i386", "product_id": "net-snmp-0:5.0.9-2.30E.24.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.24.i386", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.i386", "product_id": "net-snmp-perl-0:5.0.9-2.30E.24.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.24.i386", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.i386", "product_id": "net-snmp-devel-0:5.0.9-2.30E.24.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.24.i386", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.i386", "product_id": "net-snmp-utils-0:5.0.9-2.30E.24.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "product": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "product": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "product": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "product": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "product": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "product": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64", "product_id": "net-snmp-1:5.3.1-24.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.24.x86_64", "product": { "name": "net-snmp-0:5.0.9-2.30E.24.x86_64", "product_id": "net-snmp-0:5.0.9-2.30E.24.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "product_id": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "product_id": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "product_id": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "product_id": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "product": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=src" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.1.src", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.1.src", "product_id": "net-snmp-1:5.3.1-24.el5_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.24.src", "product": { "name": "net-snmp-0:5.0.9-2.30E.24.src", "product_id": "net-snmp-0:5.0.9-2.30E.24.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "product": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=ppc64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "product": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=ppc64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=ppc64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "product_id": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "product": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "product": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "product": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "product": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "product": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "product": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.1.ppc", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.1.ppc", "product_id": "net-snmp-1:5.3.1-24.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.24.ppc", "product": { "name": "net-snmp-0:5.0.9-2.30E.24.ppc", "product_id": "net-snmp-0:5.0.9-2.30E.24.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc", "product_id": "net-snmp-perl-0:5.0.9-2.30E.24.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc", "product_id": "net-snmp-libs-0:5.0.9-2.30E.24.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc", "product_id": "net-snmp-devel-0:5.0.9-2.30E.24.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc", "product_id": "net-snmp-utils-0:5.0.9-2.30E.24.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "product": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "product": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "product": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "product": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "product": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "product": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.1.s390x", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.1.s390x", "product_id": "net-snmp-1:5.3.1-24.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.24.s390x", "product": { "name": "net-snmp-0:5.0.9-2.30E.24.s390x", "product_id": "net-snmp-0:5.0.9-2.30E.24.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x", "product_id": "net-snmp-perl-0:5.0.9-2.30E.24.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x", "product_id": "net-snmp-libs-0:5.0.9-2.30E.24.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x", "product_id": "net-snmp-devel-0:5.0.9-2.30E.24.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x", "product_id": "net-snmp-utils-0:5.0.9-2.30E.24.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "product": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "product": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "product": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "product": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "product": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "product": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390", "product_id": "net-snmp-libs-0:5.0.9-2.30E.24.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.24.s390", "product": { "name": "net-snmp-0:5.0.9-2.30E.24.s390", "product_id": "net-snmp-0:5.0.9-2.30E.24.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390", "product_id": "net-snmp-perl-0:5.0.9-2.30E.24.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390", "product_id": "net-snmp-devel-0:5.0.9-2.30E.24.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390", "product_id": "net-snmp-utils-0:5.0.9-2.30E.24.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.src" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.src" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.src" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.src" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.src" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.src" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0960", "discovery_date": "2008-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "447974" } ], "notes": [ { "category": "description", "text": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp SNMPv3 authentication bypass (VU#877044)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:net-snmp-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-0:5.0.9-2.30E.24.src", "3AS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-0:5.0.9-2.30E.24.src", "3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-0:5.0.9-2.30E.24.src", "3ES:net-snmp-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-0:5.0.9-2.30E.24.src", "3WS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-1:5.3.1-24.el5_2.1.src", "5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0960" }, { "category": "external", "summary": "RHBZ#447974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0960", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0960" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960" } ], "release_date": "2008-06-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-10T14:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:net-snmp-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-0:5.0.9-2.30E.24.src", "3AS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-0:5.0.9-2.30E.24.src", "3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-0:5.0.9-2.30E.24.src", "3ES:net-snmp-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-0:5.0.9-2.30E.24.src", "3WS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-1:5.3.1-24.el5_2.1.src", "5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0529" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "3AS:net-snmp-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-0:5.0.9-2.30E.24.src", "3AS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-0:5.0.9-2.30E.24.src", "3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-0:5.0.9-2.30E.24.src", "3ES:net-snmp-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-0:5.0.9-2.30E.24.src", "3WS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-1:5.3.1-24.el5_2.1.src", "5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp SNMPv3 authentication bypass (VU#877044)" }, { "cve": "CVE-2008-2292", "discovery_date": "2008-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "447262" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: buffer overflow in perl module\u0027s Perl Module __snprint_value()", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:net-snmp-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-0:5.0.9-2.30E.24.src", "3AS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-0:5.0.9-2.30E.24.src", "3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-0:5.0.9-2.30E.24.src", "3ES:net-snmp-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-0:5.0.9-2.30E.24.src", "3WS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-1:5.3.1-24.el5_2.1.src", "5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2292" }, { "category": "external", "summary": "RHBZ#447262", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447262" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2292", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2292" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2292", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2292" } ], "release_date": "2007-11-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-10T14:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:net-snmp-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-0:5.0.9-2.30E.24.src", "3AS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-0:5.0.9-2.30E.24.src", "3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-0:5.0.9-2.30E.24.src", "3ES:net-snmp-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-0:5.0.9-2.30E.24.src", "3WS:net-snmp-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x", "3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src", "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x", "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-1:5.3.1-24.el5_2.1.src", "5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-1:5.3.1-24.el5_2.1.src", "5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0529" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp: buffer overflow in perl module\u0027s Perl Module __snprint_value()" } ] }
rhsa-2008_0528
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ucd-snmp packages that fix a security issue are now available for\nRed Hat Enterprise Linux 2.1.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Simple Network Management Protocol (SNMP) is a protocol used for\nnetwork management.\n\nA flaw was found in the way ucd-snmp checked an SNMPv3 packet\u0027s Keyed-Hash\nMessage Authentication Code (HMAC). An attacker could use this flaw to\nspoof an authenticated SNMPv3 packet. (CVE-2008-0960)\n\nAll users of ucd-snmp should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0528", "url": "https://access.redhat.com/errata/RHSA-2008:0528" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "447974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0528.json" } ], "title": "Red Hat Security Advisory: ucd-snmp security update", "tracking": { "current_release_date": "2024-11-22T02:03:44+00:00", "generator": { "date": "2024-11-22T02:03:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0528", "initial_release_date": "2008-06-10T07:01:00+00:00", "revision_history": [ { "date": "2008-06-10T07:01:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-06-10T03:01:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:03:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "product": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "product_id": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ucd-snmp-utils@4.2.5-8.AS21.7?arch=ia64" } } }, { "category": "product_version", "name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64", "product": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64", "product_id": "ucd-snmp-0:4.2.5-8.AS21.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ucd-snmp@4.2.5-8.AS21.7?arch=ia64" } } }, { "category": "product_version", "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "product": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "product_id": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ucd-snmp-devel@4.2.5-8.AS21.7?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ucd-snmp-0:4.2.5-8.AS21.7.src", "product": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.src", "product_id": "ucd-snmp-0:4.2.5-8.AS21.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ucd-snmp@4.2.5-8.AS21.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "product": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "product_id": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ucd-snmp-utils@4.2.5-8.AS21.7?arch=i386" } } }, { "category": "product_version", "name": "ucd-snmp-0:4.2.5-8.AS21.7.i386", "product": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.i386", "product_id": "ucd-snmp-0:4.2.5-8.AS21.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ucd-snmp@4.2.5-8.AS21.7?arch=i386" } } }, { "category": "product_version", "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "product": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "product_id": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/ucd-snmp-devel@4.2.5-8.AS21.7?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.src" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.src" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.src" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-0:4.2.5-8.AS21.7.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.src" }, "product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386" }, "product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64" }, "product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "relates_to_product_reference": "2.1WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0960", "discovery_date": "2008-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "447974" } ], "notes": [ { "category": "description", "text": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp SNMPv3 authentication bypass (VU#877044)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0960" }, { "category": "external", "summary": "RHBZ#447974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0960", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0960" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960" } ], "release_date": "2008-06-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-10T07:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0528" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.src", "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64", "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386", "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "net-snmp SNMPv3 authentication bypass (VU#877044)" } ] }
ghsa-xmp9-m365-hwwg
Vulnerability from github
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
{ "affected": [], "aliases": [ "CVE-2008-0960" ], "database_specific": { "cwe_ids": [ "CWE-287" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-06-10T18:32:00Z", "severity": "HIGH" }, "details": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.", "id": "GHSA-xmp9-m365-hwwg", "modified": "2022-05-01T23:35:08Z", "published": "2022-05-01T23:35:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/5790" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "type": "WEB", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/30574" }, { "type": "WEB", "url": "http://secunia.com/advisories/30596" }, { "type": "WEB", "url": "http://secunia.com/advisories/30612" }, { "type": "WEB", "url": "http://secunia.com/advisories/30615" }, { "type": "WEB", "url": "http://secunia.com/advisories/30626" }, { "type": "WEB", "url": "http://secunia.com/advisories/30647" }, { "type": "WEB", "url": "http://secunia.com/advisories/30648" }, { "type": "WEB", "url": "http://secunia.com/advisories/30665" }, { "type": "WEB", "url": "http://secunia.com/advisories/30802" }, { "type": "WEB", "url": "http://secunia.com/advisories/31334" }, { "type": "WEB", "url": "http://secunia.com/advisories/31351" }, { "type": "WEB", "url": "http://secunia.com/advisories/31467" }, { "type": "WEB", "url": "http://secunia.com/advisories/31568" }, { "type": "WEB", "url": "http://secunia.com/advisories/32664" }, { "type": "WEB", "url": "http://secunia.com/advisories/33003" }, { "type": "WEB", "url": "http://secunia.com/advisories/35463" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3933" }, { "type": "WEB", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "type": "WEB", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT2163" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "type": "WEB", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1663" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/878044" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "type": "WEB", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/29623" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1020218" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1612" } ], "schema_version": "1.4.0", "severity": [] }
var-200806-0575
Vulnerability from variot
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. SNMPv3 The implementation of contains an authentication bypass vulnerability because it does not properly handle crafted packets. SNMP (Simple Network Management Protocol) Is a widely used protocol for monitoring and managing network devices. SNMPv3 Supports security features such as authentication and privacy control. SNMPv3 In the authentication of HMAC (keyed-Hash Message Authentication Code) Is used. This code is generated by combining a private key and a cryptographic hash function. SNMPv3 Depending on the implementation of, there is a possibility that authentication may be bypassed by processing specially crafted packets due to vulnerability in authentication processing.By remote third party SNMP The object may be read or modified. Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error. Successfully exploiting this issue will allow attackers to gain unauthorized access to the affected application. Net-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. Vulnerabilities exist in Net-SNMP's handling of authentication. Net-SNMP's authentication code depends on the length of the HMAC length specified in the user input to read the length to be checked. If the user provides a single-byte HMAC code in the authentication code field, only the first byte will be checked, so there will be a 1/256 probability of matching the correct HMAC and Through authentication, this greatly improves the success rate of brute force guessing. An attacker could exploit this vulnerability to read and modify any SNMP object accessible using the authenticated credentials logged into the system. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2008-0017 Synopsis: Updated ESX packages for libxml2, ucd-snmp, libtiff Issue date: 2008-10-31 Updated on: 2008-10-31 (initial release of advisory) CVE numbers: CVE-2008-3281 CVE-2008-0960 CVE-2008-2327
- Summary
Updated ESX packages for libxml2, ucd-snmp, libtiff.
- Relevant releases
ESX 3.0.3 without patch ESX303-200810503-SG ESX 3.0.2 without patch ESX-1006968 ESX 2.5.5 before Upgrade Patch 10 ESX 2.5.4 before Upgrade Patch 21
NOTE: Extended support (Security and Bug fixes) for ESX 3.0.2 ended on 2008-10-29. Extended support (Security and Bug fixes) for ESX 2.5.4 ended on 2008-10-08.
Extended support for ESX 3.0.2 Update 1 ends on 2009-08-08. Users
should plan to upgrade to ESX 3.0.3 and preferably to the newest
release available.
- Problem Description
a. Updated ESX Service Console package libxml2
A denial of service flaw was found in the way libxml2 processes
certain content. If an application that is linked against
libxml2 processes malformed XML content, the XML content might
cause the application to stop responding.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-3281 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX affected, patch pending
ESX 3.0.3 ESX ESX303-200810503-SG
ESX 3.0.2 ESX ESX-1006968
ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 10 or later
ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 21
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
b. Updated ESX Service Console package ucd-snmp
A flaw was found in the way ucd-snmp checks an SNMPv3 packet's
Keyed-Hash Message Authentication Code. An attacker could use
this flaw to spoof an authenticated SNMPv3 packet.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-0960 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX not affected
ESX 3.0.3 ESX not affected
ESX 3.0.2 ESX not affected
ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 10 or later
ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 21
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
c. Updated third party library libtiff
Multiple uses of uninitialized values were discovered in libtiff's
Lempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker
could create a carefully crafted LZW-encoded TIFF file that would
cause an application linked with libtiff to crash or, possibly,
execute arbitrary code.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-2327 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX not affected
ESX 3.0.3 ESX not affected
ESX 3.0.2 ESX not affected
ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 10 or later
ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 21
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
- Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
ESX
ESX 3.0.3 patch ESX303-200810503-SG http://download3.vmware.com/software/vi/ESX303-200810503-SG.zip md5sum: e687313e58377be41f6e6b767dfbf268 http://kb.vmware.com/kb/1006971
ESX 3.0.2 patch ESX-1006968 http://download3.vmware.com/software/vi/ESX-1006968.tgz md5sum: fc9e30cff6f03a209e6a275254fa6719 http://kb.vmware.com/kb/1006968
VMware ESX 2.5.5 Upgrade Patch 10 http://download3.vmware.com/software/esx/esx-2.5.5-119702-upgrade.tar.gz md5sum: 2ee87cdd70b1ba84751e24c0bd8b4621 http://vmware.com/support/esx25/doc/esx-255-200810-patch.html
VMware ESX 2.5.4 Upgrade Patch 21 http://download3.vmware.com/software/esx/esx-2.5.4-119703-upgrade.tar.gz md5sum: d791be525c604c852a03dd7df0eabf35 http://vmware.com/support/esx25/doc/esx-254-200810-patch.html
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327
- Change log
2008-10-31 VMSA-2008-0017 Initial security advisory after release of ESX 3.0.3, ESX 3.0.2, ESX 2.5.5 and ESX 2.5.4 patches on 2008-10-30.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. All rights reserved. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200808-02
http://security.gentoo.org/
Severity: Normal Title: Net-SNMP: Multiple vulnerabilities Date: August 06, 2008 Bugs: #222265, #225105 ID: 200808-02
Synopsis
Multiple vulnerabilities in Net-SNMP allow for authentication bypass in snmpd and execution of arbitrary code in Perl applications using Net-SMNP.
Background
Net-SNMP is a collection of tools for generating and retrieving SNMP data.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-analyzer/net-snmp < 5.4.1.1 >= 5.4.1.1
Description
Wes Hardaker reported that the SNMPv3 HMAC verification relies on the client to specify the HMAC length (CVE-2008-0960). John Kortink reported a buffer overflow in the Perl bindings of Net-SNMP when processing the OCTETSTRING in an attribute value pair (AVP) received by an SNMP agent (CVE-2008-2292).
Impact
An attacker could send SNMPv3 packets to an instance of snmpd providing a valid user name and an HMAC length value of 1, and easily conduct brute-force attacks to bypass SNMP authentication. An attacker could further entice a user to connect to a malicious SNMP agent with an SNMP client using the Perl bindings, possibly resulting in the execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All Net-SNMP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.1.1"
References
[ 1 ] CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 [ 2 ] CVE-2008-2292 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200808-02.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us.
License
Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUSE Security Announcement
Package: net-snmp
Announcement ID: SUSE-SA:2008:039
Date: Fri, 01 Aug 2008 13:00:00 +0000
Affected Products: openSUSE 10.2
openSUSE 10.3
openSUSE 11.0
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP1
SLE SDK 10 SP1
SLE SDK 10 SP2
SUSE Linux Enterprise Server 10 SP1
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: authentication bypass, denial-of-service
Severity (1-10): 6
SUSE Default Package: no
Cross-References: CVE-2008-0960
CVE-2008-2292
Content of This Advisory:
1) Security Vulnerability Resolved:
- authentication bypass
- denial-of-service
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- viewvc/subversion
6) Authenticity Verification and Additional Information
1) Problem Description and Brief Discussion
The net-snmp daemon implements the "simple network management protocol". The version 3 of SNMP as implemented in net-snmp uses the length of the HMAC in a packet to verify against a local HMAC for authentication. An attacker can therefore send a SNMPv3 packet with a one byte HMAC and guess the correct first byte of the local HMAC with 256 packets (max).
Additionally a buffer overflow in perl-snmp was fixed that can cause a denial-of-service/crash.
2) Solution or Work-Around
Please install the update package.
3) Special Instructions and Notes
Please restart net-snmp after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST Online Update (YOU) tool. YOU detects which updates are required and automatically performs the necessary steps to verify and install them. Alternatively, download the update packages for your distribution manually and verify their integrity by the methods listed in Section 6 of this announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing
x86 Platform:
openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libsnmp15-5.4.1-77.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-5.4.1-77.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-devel-5.4.1-77.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/perl-SNMP-5.4.1-77.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/snmp-mibs-5.4.1-77.2.i586.rpm
openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libsnmp15-5.4.1-19.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-5.4.1-19.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-devel-5.4.1-19.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/perl-SNMP-5.4.1-19.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/snmp-mibs-5.4.1-19.2.i586.rpm
openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/net-snmp-5.4.rc2-8.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/net-snmp-devel-5.4.rc2-8.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/perl-SNMP-5.4.rc2-8.i586.rpm
x86-64 Platform:
openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/net-snmp-32bit-5.4.1-77.2.x86_64.rpm
openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/net-snmp-32bit-5.4.1-19.2.x86_64.rpm
openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/net-snmp-32bit-5.4.rc2-8.x86_64.rpm
Sources:
openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/net-snmp-5.4.1-77.2.src.rpm
openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/net-snmp-5.4.1-19.2.src.rpm
openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/net-snmp-5.4.rc2-8.src.rpm
Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web:
Open Enterprise Server http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
Novell Linux POS 9 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
Novell Linux Desktop 9 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
SUSE Linux Enterprise Server 10 SP1 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
SUSE Linux Enterprise Server 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
SLE SDK 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
SLE SDK 10 SP1 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
SUSE Linux Enterprise Desktop 10 SP1 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
SUSE Linux Enterprise Desktop 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
SUSE SLES 9 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- viewvc/subversion
This update of subversion fixes multiple vulnerabilities.
- CVE-2008-1290: list CVS or SVN commits on "all-forbidden" files
- CVE-2008-1291: directly access hidden CVSROOT folders
- CVE-2008-1292: expose restricted content via the revision view, the log history, or the diff view
6) Authenticity Verification and Additional Information
-
Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web sites. The authenticity and integrity of a SUSE security announcement is guaranteed by a cryptographic signature in each announcement. All SUSE security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file and run the command
gpg --verify
replacing
with the name of the file where you saved the announcement. The output for a valid signature looks like: gpg: Signature made
using RSA key ID 3D25D3D9 gpg: Good signature from "SuSE Security Team security@suse.de" where
is replaced by the date the document was signed. If the security team's key is not contained in your key ring, you can import it from the first installation CD. To import the key, use the command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
-
Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the world. While this service is considered valuable and important to the free and open source software community, the authenticity and the integrity of a package needs to be verified to ensure that it has not been tampered with.
The internal rpm package signatures provide an easy way to verify the authenticity of an RPM package. Use the command
rpm -v --checksig
to verify the signature of the package, replacing
with the filename of the RPM package downloaded. The package is unmodified if it contains a valid signature from build@suse.de with the key ID 9C800ACA. This key is automatically imported into the RPM database (on RPMv4-based distributions) and the gpg key ring of 'root' during installation. You can also find it on the first installation CD and at the end of this announcement.
-
SUSE runs two security mailing lists to which any interested party may subscribe:
opensuse-security@opensuse.org - General Linux and SUSE security discussion. All SUSE security announcements are sent to this list. To subscribe, send an e-mail to opensuse-security+subscribe@opensuse.org.
opensuse-security-announce@opensuse.org - SUSE's announce-only mailing list. Only SUSE's security announcements are sent to this list. To subscribe, send an e-mail to opensuse-security-announce+subscribe@opensuse.org.
===================================================================== SUSE's security contact is security@suse.com or security@suse.de. The security@suse.de public key is listed below. =====================================================================
The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. In particular, the clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team security@suse.de pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key build@suse.de
- -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.2 (GNU/Linux)
mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh 1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+ cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7 tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63 Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+ x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0 Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2 saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+ 3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP +Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR 8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U 8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF 5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3 D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd 9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13 CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp 271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO =ypVs - -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSJL0gHey5gA9JdPZAQI4IAf7BPqInfbAyzZObcX2vGZM0svDKclNQMAO 1tTE0O3Te0EYLOnkfEisqNe9AOioSUQqeWu7ud5Y8L5zVysmcGe3/Lg0Vqmie/he WJXCJtkvaPOcp7p/GcnWQByQ4T1cQ4+QoLhwg2+RpyAABn/7ZWBz+uG91134kOql JabvxLI05Le++uwFfJ0YEefkSzik9sMVz4Dk4eVJglMm6nioHnx6K6ZrR0+0HBRR z2Rczq0M3gYplfWpgydgtlFH4dhkXlhfuladf93Aagf6QWerwvxTEld7ti+Sx3dU uInx4nkLJHLeu1f/XD4i7ZpZ0DtBz0F9wWJFGmy2cXxW0Xnhtwdbnw== =QwLq -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . =========================================================== Ubuntu Security Notice USN-685-1 December 03, 2008 net-snmp vulnerabilities CVE-2008-0960, CVE-2008-2292, CVE-2008-4309 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libsnmp-perl 5.2.1.2-4ubuntu2.3 libsnmp9 5.2.1.2-4ubuntu2.3
Ubuntu 7.10: libsnmp-perl 5.3.1-6ubuntu2.2 libsnmp10 5.3.1-6ubuntu2.2
Ubuntu 8.04 LTS: libsnmp-perl 5.4.1~dfsg-4ubuntu4.2 libsnmp15 5.4.1~dfsg-4ubuntu4.2
Ubuntu 8.10: libsnmp15 5.4.1~dfsg-7.1ubuntu6.1
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
Wes Hardaker discovered that the SNMP service did not correctly validate HMAC authentication requests. An unauthenticated remote attacker could send specially crafted SNMPv3 traffic with a valid username and gain access to the user's views without a valid authentication passphrase. (CVE-2008-0960)
John Kortink discovered that the Net-SNMP Perl module did not correctly check the size of returned values. If a user or automated system were tricked into querying a malicious SNMP server, the application using the Perl module could be made to crash, leading to a denial of service. This did not affect Ubuntu 8.10. (CVE-2008-2292)
It was discovered that the SNMP service did not correctly handle large GETBULK requests. If an unauthenticated remote attacker sent a specially crafted request, the SNMP service could be made to crash, leading to a denial of service. (CVE-2008-4309)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz
Size/MD5: 75402 9655d984a47cec8e27efa4db0b227870
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc
Size/MD5: 838 17a17230a005c1acfd0569757e728fad
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz
Size/MD5: 3869893 34159770a7fe418d99fdd416a75358b1
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb
Size/MD5: 1152306 f7647cee4df8db87ab48c0d05635a973
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb
Size/MD5: 822946 b9b852c188937d1fffc06d4da01325d5
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 896620 a78012b3f0f13667081f97dc1a4d62e8
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 1497194 7d55b8d1e4ae0c45753bedcf536a1a5a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 1826252 0550c1401f9bbe5f345fd96484ed369c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 889330 5ad0ddb2c610973166e4dd07769ba3d3
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 797086 18cf4210342b683d3ee24fe995329b55
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 896880 298d27ea1ece6e80bb8931b9a5e61961
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 1268472 acbca43ab7ea747fa3e4636d15ef997c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 1710342 bd27290685bcf1d6a23eb8705d3367e7
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 881838 58121bd9e4c845da7df4e540645e0e13
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 794672 221d1c554bd89f50dc3ac9108a6cef6b
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 913064 45a033b01c4b31ef90a92988bb5fb229
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 1590124 b62aa5477d9307d311c811298b7ec3d9
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 1728094 5214ce9aebe3a8d7a28a1746a81ce8ea
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 898580 86e6c1b5dfb5bf91f63d7c6786b7abae
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 796092 1bab28407224f782b2c3ae04b4647333
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 896832 3d233db9682d5654fdad6bc6b5a649ba
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 1485268 064304ead0ca4653136376e8e9039e74
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 1706490 cb76027eb8167e0866a81b93a4da28ed
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 883182 d1ffc12427d92be51efdba3349e74f9a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 796374 0f3f749ebe4af6111fe49316639004e4
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz
Size/MD5: 94646 8b6f9380d9f8c5514a1d4db729c6df04
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc
Size/MD5: 1287 f53866efd3ae4f3c939a77b1005e1f11
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz
Size/MD5: 4210843 360a9783dbc853bab6bda90d961daee5
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb
Size/MD5: 484306 f2d03276d1cdcef7e8b276ad8ca9595d
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb
Size/MD5: 901284 6889b371d4de92eb61bf83b89d8a8c37
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 2541692 1e6de4bd3c3baa444a2e1980a593a40e
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 968940 7efe4bdcb99f311f1c4bb2c3b9d24a4e
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 1200930 821861c24499cfdfa2a82c329c610c16
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 996572 00cc1a4c8c7924124984e666563e73d0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 908792 a40763280a3bdbe60eca5e07c5d6c30c
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 2321524 59d44616802197e1227cf88abddefe36
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 967106 a6e5b308d889bdf6f5abe454e35ba474
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 1124462 ec99daa26d0fafba6e9f0b874a23bf3d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 991956 cb20b6a4d68a858ffa0846431169d411
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 907546 1ab5119e23a16e99203c113d49fc2723
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 2305548 da57690a3327196e0c3684735be23f2e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 968984 8da336a5fd871be10e6b8d66d3b9c9d3
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 1074500 e4d6690a6a6a543fc0244a29cd350c9b
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 989566 2d2f4b1662e6a2dffafe8e98f00a15e7
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 907596 4274e006754ebc836132166e0f0429a0
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 2641202 9b2ec56463ee715752b780aa332d8cd0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 985722 a2fca8426b7b51e98c39b91a468bf71f
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 1154496 6073239f7ffead2a5b9c3357ada1602c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 1018596 af12cc55597a0d2d3a92b4b5d683bb14
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 911866 57e2246930e712bdc1b039840d43af48
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 2527568 19b1a0971259a9b99f9c0386f5935bfc
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 970264 d8ae7f0bb10375ad487b14ba031cd013
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 1078842 2401fc4c40352b8c8013e8c5de3b0ecd
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 995228 16b230d3c718d8eb4a023126bd09d7f5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 908708 1e410a8ddac41ad9faec901c5a638f29
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz
Size/MD5: 78642 b4acf50e47be498e579b934f32081d25
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc
Size/MD5: 1447 0abcea5df87851df2aae7ebd1fc00e7a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz
Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb
Size/MD5: 526864 f3a131bf5a4f5c547573430cb66d410c
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb
Size/MD5: 102072 2f276f50efdb7e34f7e61f132f7f7cd7
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 1796950 283c5a95206ab74062e0e30eba4e0890
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 142522 9fff294368a7eac39e37fa478ac6609d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 1296694 d0646a1543c51f14a93b40f972bc1569
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 163178 0378a25e3b2a0bc80ddb8ec720b5557d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 75960 fcba461f2e2376cad515329791e04a17
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 38512 21d9ecbc86a8e5965047d027e94fd324
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 1556806 39e4f63b841c4b36c022017d66c12f58
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 179478 5f08596ae997792920e238ff8cd2a7ba
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 1098794 38bc61a5b403fb4f626a641a5f13e681
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 157954 66e38c37639f3c68e7e4a933fa953ff3
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 74116 50b3a4d0cfd38585d2711d30cf725e9d
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 75038 98cdeec4b1014568b00107a82fc74418
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 1552018 d9dcab084f3b9bf3e8c36cb5db8f141e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 141508 96061180809cccc975e0d7079e07ed3e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 1171530 2d91048fe0a2ac9e3a4fddb84c67513e
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 155564 c67ba3aeb2535ee3e7fc4c89e90ba36a
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 74274 db05202893f516398bbe4e2153ef2d6e
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 35552 a75caf212ffb5a0eafe4ba2656c9aae1
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 1874428 0ed8b5f4e6bad74d506d73447de00bd2
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 158374 dfcd7c4455b4bbd3f746368058d09a59
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 1238226 b5b3a81e956cdb14674d571694d1b6d0
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 185314 5e9d8bd56493f75ae8a8691c530aa420
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 83106 75dea32ec7152b7868fabf09d9d5a198
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 42928 214fe703fced2e387b48b51dcbb1d6b7
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 1760062 ade4c08289d947d092a5b2ab06517cc7
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 143860 62b7260d618531b0ed5e7871ab7b99a9
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 1159702 28ea81660bbdd9d7982be58d225e8814
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 160236 196e493ce73905446a3764e73b99f332
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 75518 f24e4b0e3e4a7d97c28da99cdc0a47a5
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 38240 873f5e820e381ec2254ed520bcd09af0
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz
Size/MD5: 82260 85fb58aa81933f142bd937bca2e18341
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc
Size/MD5: 1956 1ee06f6b731eae435af6a2d438ef909b
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz
Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb
Size/MD5: 527650 9c56f3d70018b714895a61c0daba9498
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb
Size/MD5: 103060 108eb50387ca46b4ee38ebb8722ced88
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 1815638 82385081fe2d4eeb1a6c94f9dae672ad
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 146154 1b6249e02e89213f2f4d2aa9c9123420
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 1315628 8443e091f2c63485a422236ad23e55cd
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 165522 154a05824b98e041ceac60ac83709ef4
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 77914 8d6e328f309e78bf1fcf21c2633d82ec
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 39930 6b7a1a67ca63b5c843ce66f3547b3c89
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 1569568 dd0599b150eccee9889325d17a7b0769
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 184264 52a54aebef81648164a5bc90f27b0cc5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 1119072 10c81fe283b25e7ad31fcfd88a2325f0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 156112 6296f0836bc9797ff48810c79965c3a5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 74476 bd96a6915eb97fed083aac4daa5f07cf
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 77652 3e30e51c362dfa982a3b3197be081328
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 1557614 065f4575c7a2d257fa6b5b9d0cee454f
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 144292 b55f2c4aff8a86499d7f38fd6e773f44
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 1184272 84116fefdce279ce338ffc9614384c06
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 154444 ffe9e765a01695355bdb58008a2910f5
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 73746 762e75672fbd395d2d159513f5d572b0
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 36530 0a98b51b94a5f75d4131d657aa766579
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 1884632 a3ad023841ee605efa1e055712b44d9a
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 161074 5586adea8200d2d5bf81f288b5bf7be2
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 1249636 48ec688499fea1dc0ccb3091c0158fb8
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 181952 8ef5f6b9b6c6b8e4fcd5cb37147304a2
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 81802 965218126fb5a49cfcd9e20afeb49782
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 43048 09f2f9ed9f519ca5723411802e46d48b
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 1759316 46455cc355c1b808243eada0f134d00b
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 145164 2cdb5b35db853c7c184a44022fc23cd8
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 1159834 cfff424e5bff38bb3ef9419f03465388
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 163042 354f7a5423a34c411c5f8620c66d3e58
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 76994 ca11bcf9a411f618e35e1d6b6ab8c8f9
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 38526 172493ec5df1866e2633e074c7f38775
.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292
Updated Packages:
Mandriva Linux 2007.1: 8db66ef5a5468d3fd72a47855230a28e 2007.1/i586/libnet-snmp10-5.3.1-3.2mdv2007.1.i586.rpm c951b17138ef11828b2ccf031d4cddaf 2007.1/i586/libnet-snmp10-devel-5.3.1-3.2mdv2007.1.i586.rpm 536a87919f32fac81964d0a907bf08fe 2007.1/i586/libnet-snmp10-static-devel-5.3.1-3.2mdv2007.1.i586.rpm 39e33947c21666dac5dbe5cfe103b26d 2007.1/i586/net-snmp-5.3.1-3.2mdv2007.1.i586.rpm 1eed5ebaff8f6f83befbf8d831900073 2007.1/i586/net-snmp-mibs-5.3.1-3.2mdv2007.1.i586.rpm 874db03c69584025e4d91049072d3c4e 2007.1/i586/net-snmp-trapd-5.3.1-3.2mdv2007.1.i586.rpm 11af93c879d8cd9353b7cb1826900222 2007.1/i586/net-snmp-utils-5.3.1-3.2mdv2007.1.i586.rpm 2c9e819eeb5fd472f6a0fe338d86182b 2007.1/i586/perl-NetSNMP-5.3.1-3.2mdv2007.1.i586.rpm 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64: aa27de502ce22110fd745c0b847b79d9 2007.1/x86_64/lib64net-snmp10-5.3.1-3.2mdv2007.1.x86_64.rpm 1843dd154c443cca9ae977e502221d6d 2007.1/x86_64/lib64net-snmp10-devel-5.3.1-3.2mdv2007.1.x86_64.rpm 838bd7820d446bd947bc46e090b38066 2007.1/x86_64/lib64net-snmp10-static-devel-5.3.1-3.2mdv2007.1.x86_64.rpm e659d3df04816330c7bf45008f66bc27 2007.1/x86_64/net-snmp-5.3.1-3.2mdv2007.1.x86_64.rpm 756d5606a1039d20a7512b0a109d53bb 2007.1/x86_64/net-snmp-mibs-5.3.1-3.2mdv2007.1.x86_64.rpm 8ad36943e07362865f3a48c99914e48c 2007.1/x86_64/net-snmp-trapd-5.3.1-3.2mdv2007.1.x86_64.rpm 483140c06017507127d12357c3ed2b41 2007.1/x86_64/net-snmp-utils-5.3.1-3.2mdv2007.1.x86_64.rpm e2bb901815ffa1ca5b0a16bc1363f84f 2007.1/x86_64/perl-NetSNMP-5.3.1-3.2mdv2007.1.x86_64.rpm 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm
Mandriva Linux 2008.0: 8de3c4975620db2b2c2697d6f9deb79b 2008.0/i586/libnet-snmp15-5.4.1-1.1mdv2008.0.i586.rpm b1991c58d996f4be200fe141e28c5f7d 2008.0/i586/libnet-snmp-devel-5.4.1-1.1mdv2008.0.i586.rpm 03c54182cc7f97633f29ff0251a8c898 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.1mdv2008.0.i586.rpm 1f792de19b7b38b56d68242958d5d800 2008.0/i586/net-snmp-5.4.1-1.1mdv2008.0.i586.rpm e3362a641e232a6ecf0b8230f0e49ec8 2008.0/i586/net-snmp-mibs-5.4.1-1.1mdv2008.0.i586.rpm bc6d8c10135ea64a4d512d80d04b1b39 2008.0/i586/net-snmp-trapd-5.4.1-1.1mdv2008.0.i586.rpm 8e7f28ee85fb48129eea57d11d391c8b 2008.0/i586/net-snmp-utils-5.4.1-1.1mdv2008.0.i586.rpm beab129e378f61a6bf62d366a4d90639 2008.0/i586/perl-NetSNMP-5.4.1-1.1mdv2008.0.i586.rpm 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 82b570c9cb7e0662df4d7da730c131db 2008.0/x86_64/lib64net-snmp15-5.4.1-1.1mdv2008.0.x86_64.rpm 20b8a6e3fc8dd82fe5ecfdb337553938 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.1mdv2008.0.x86_64.rpm 555688caa0eee850b3a5f835a5778849 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.1mdv2008.0.x86_64.rpm 60d65f80aec29dcb6d4ceb4bb117a9bc 2008.0/x86_64/net-snmp-5.4.1-1.1mdv2008.0.x86_64.rpm 685c9dd25b585afc128de1b3c092e5d5 2008.0/x86_64/net-snmp-mibs-5.4.1-1.1mdv2008.0.x86_64.rpm 7bff860904572c092f737ac17940d5b2 2008.0/x86_64/net-snmp-trapd-5.4.1-1.1mdv2008.0.x86_64.rpm e434686bddfb04f2a8bd01346517ecb4 2008.0/x86_64/net-snmp-utils-5.4.1-1.1mdv2008.0.x86_64.rpm 4fab6e498e1f05809db500ce895aad66 2008.0/x86_64/perl-NetSNMP-5.4.1-1.1mdv2008.0.x86_64.rpm 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.1: 4bafceae1a29f6557b5aa884eca24ba0 2008.1/i586/libnet-snmp15-5.4.1-5.1mdv2008.1.i586.rpm 1eedbae5df7e503de1cba736129beaa1 2008.1/i586/libnet-snmp-devel-5.4.1-5.1mdv2008.1.i586.rpm 615a88847cbf1ce6eaf0029037a14b1b 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.1mdv2008.1.i586.rpm 7323cb7d35eb67664d40ad73b413679d 2008.1/i586/net-snmp-5.4.1-5.1mdv2008.1.i586.rpm d43ed96a806639a94af2a137c75e276e 2008.1/i586/net-snmp-mibs-5.4.1-5.1mdv2008.1.i586.rpm 7394b1361b43056b5eb99827771358cf 2008.1/i586/net-snmp-tkmib-5.4.1-5.1mdv2008.1.i586.rpm 8d6fd9308c2edbe8c020d2c33b3a841d 2008.1/i586/net-snmp-trapd-5.4.1-5.1mdv2008.1.i586.rpm dc58047a02e1a222af20aa794ea8f447 2008.1/i586/net-snmp-utils-5.4.1-5.1mdv2008.1.i586.rpm 2ad9888cd61fc4952c1cee0c48f714b5 2008.1/i586/perl-NetSNMP-5.4.1-5.1mdv2008.1.i586.rpm 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: 618c241e0ecb57685646264c9bb083b4 2008.1/x86_64/lib64net-snmp15-5.4.1-5.1mdv2008.1.x86_64.rpm bb0ebf49ee7cca29965aeb398f4725f6 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.1mdv2008.1.x86_64.rpm b4f29f00773291f6cc00784ed7cde470 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.1mdv2008.1.x86_64.rpm 3039811b6682dc4009b32ff48a99eb2b 2008.1/x86_64/net-snmp-5.4.1-5.1mdv2008.1.x86_64.rpm fab09178635501eb5d6a82eb7bd532a3 2008.1/x86_64/net-snmp-mibs-5.4.1-5.1mdv2008.1.x86_64.rpm da29d4c7edaa15d95f8bee98dbfab025 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.1mdv2008.1.x86_64.rpm d9aad834d82d310c64f6f21e17a55920 2008.1/x86_64/net-snmp-trapd-5.4.1-5.1mdv2008.1.x86_64.rpm 7a7c871bd87dc91c16b046ac115cda70 2008.1/x86_64/net-snmp-utils-5.4.1-5.1mdv2008.1.x86_64.rpm d102ea2af0fcaaebd98defda72bcfc91 2008.1/x86_64/perl-NetSNMP-5.4.1-5.1mdv2008.1.x86_64.rpm 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm
Corporate 3.0: 335af3930865c8eb44ef436cad5fb373 corporate/3.0/i586/libnet-snmp5-5.1-7.4.C30mdk.i586.rpm b8e1d307ee6fa3905d292077fc063318 corporate/3.0/i586/libnet-snmp5-devel-5.1-7.4.C30mdk.i586.rpm a668cc4de411865567d1a93f34cee1e3 corporate/3.0/i586/libnet-snmp5-static-devel-5.1-7.4.C30mdk.i586.rpm d8c0d342b03e5719443d2de06c631bd5 corporate/3.0/i586/libsnmp0-4.2.3-8.2.C30mdk.i586.rpm 6bbe3bb2502ce3c974f7b5737331bb4d corporate/3.0/i586/libsnmp0-devel-4.2.3-8.2.C30mdk.i586.rpm daca10f2e578f75c1e7415d78ed30265 corporate/3.0/i586/net-snmp-5.1-7.4.C30mdk.i586.rpm 1630ebd75201e1bc3956b12a26282f92 corporate/3.0/i586/net-snmp-mibs-5.1-7.4.C30mdk.i586.rpm 5a4f483c877a6278088a265cb3273d61 corporate/3.0/i586/net-snmp-trapd-5.1-7.4.C30mdk.i586.rpm 316d866de7fa7cd984d58f5cb742f5e3 corporate/3.0/i586/net-snmp-utils-5.1-7.4.C30mdk.i586.rpm e3d4197517565f12e2c3a8fd1cc5d2e7 corporate/3.0/i586/ucd-snmp-4.2.3-8.2.C30mdk.i586.rpm 17e8d856fd1dac18552818a842105c88 corporate/3.0/i586/ucd-snmp-utils-4.2.3-8.2.C30mdk.i586.rpm ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm
Corporate 3.0/X86_64: b31f277942fca76d953007c94a60cae2 corporate/3.0/x86_64/lib64net-snmp5-5.1-7.4.C30mdk.x86_64.rpm e4a3fba10ccdd805dc8783ae68c99a42 corporate/3.0/x86_64/lib64net-snmp5-devel-5.1-7.4.C30mdk.x86_64.rpm 530a94cc87af0e4d6e9f3815473c0dd4 corporate/3.0/x86_64/lib64net-snmp5-static-devel-5.1-7.4.C30mdk.x86_64.rpm f246ca421b5d16c599d53f70e4b97660 corporate/3.0/x86_64/lib64snmp0-4.2.3-8.2.C30mdk.x86_64.rpm b943e07726a2fecb016ef4ba626906d8 corporate/3.0/x86_64/lib64snmp0-devel-4.2.3-8.2.C30mdk.x86_64.rpm 22822876f72e35cf6d1ed027df93e74a corporate/3.0/x86_64/net-snmp-5.1-7.4.C30mdk.x86_64.rpm e7e51782b9bbd1e1bdf93c17fb953280 corporate/3.0/x86_64/net-snmp-mibs-5.1-7.4.C30mdk.x86_64.rpm e67a9105f9492c020693d48ce55652ea corporate/3.0/x86_64/net-snmp-trapd-5.1-7.4.C30mdk.x86_64.rpm 171a17e507b2dfdb9c70c0089e582221 corporate/3.0/x86_64/net-snmp-utils-5.1-7.4.C30mdk.x86_64.rpm 96886146d21175b076e92d59e96f5016 corporate/3.0/x86_64/ucd-snmp-4.2.3-8.2.C30mdk.x86_64.rpm 1b6ee4c253f15be516a1928a4f791f15 corporate/3.0/x86_64/ucd-snmp-utils-4.2.3-8.2.C30mdk.x86_64.rpm ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm
Corporate 4.0: 6cbe9d76db3b05c2435bcbc5cf16c898 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.2.20060mlcs4.i586.rpm 586a55cfde45020d5ea0ebf5f2d6c840 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm d992d8300cf0639942a179349d592e15 corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm 03a49b848c376b705dcfcef0ec817daf corporate/4.0/i586/net-snmp-5.2.1.2-5.2.20060mlcs4.i586.rpm 22b9d01b3b7a8a34ed3e1a5a435286a8 corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.i586.rpm dccc01a94c1f29eac2875e6a935bf589 corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.i586.rpm 77f93230f96abce039b52ca5612eaa36 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.i586.rpm 8a7209b70979c9d73035ff40cbd8dbb4 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.i586.rpm ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm
Corporate 4.0/X86_64: f94c7e967973ba8aa12b5605251d6e78 corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.2.20060mlcs4.x86_64.rpm f332985986eff2d6c8a75b5c263dedb1 corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 82fc454916e75866370ee738292021c8 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm ff0adeb23df57eb34869c7100df159da corporate/4.0/x86_64/net-snmp-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 72f2dc9cb1695999660a9ff9c97e4c47 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 0f244551c87e051a8274e5050cf0bc2a corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 7c4e7fb304c77c6551a50495d338e84e corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 68d81ca4c173710ef43b36092df2a6ee corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.x86_64.rpm ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm
Multi Network Firewall 2.0: f98286a301d580fe306917cf0169ef88 mnf/2.0/i586/libnet-snmp5-5.1-7.4.M20mdk.i586.rpm 3ba27516773b1dd933828207cecc7754 mnf/2.0/SRPMS/net-snmp-5.1-7.4.M20mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200806-0575", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xr", "scope": null, "trust": 1.1, "vendor": "cisco", "version": null }, { "model": "session and resource control", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.0" }, { "model": "src pe", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.0" }, { "model": "session and resource control", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.0" }, { "model": "src pe", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "extreme", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "global associates", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet initiative", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "network appliance", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "snmp research", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ecoscentric", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netsnmp", "version": null }, { "model": "net-snmp", "scope": "lt", "trust": 0.8, "vendor": "net snmp", "version": "5.2.4.1" }, { "model": "net-snmp", "scope": "lt", "trust": 0.8, "vendor": "net snmp", "version": "5.3.2.1" }, { "model": "net-snmp", "scope": "lt", "trust": 0.8, "vendor": "net snmp", "version": "5.4.1.1" }, { "model": "mac os x", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.5.4" }, { "model": "mac os x server", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.5.4" }, { "model": "centrecom", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "9424t/sp" }, { "model": "centrecom", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "9424t/sp-e" }, { "model": "centrecom", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "9424ts/xp-e" }, { "model": "switchblade 5400s series", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "switchblade 7800r series", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "switchblade 7800s series", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "switchblade x908", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "x900-12xt/s", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "x900-24xs", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "x900-24xt", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "ax2400s series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax3600s series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax5400s series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax6300s series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax6700s series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax7700r series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax7800r series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax7800s series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "seil/neu", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "128 2.00 to 2.42" }, { "model": "seil/plus", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "1.00 to 1.91" }, { "model": "seil/turbo", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "1.00 to 1.91" }, { "model": "seil/x1,x2", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "1.00 to 1.20" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "opensolaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "(sparc)" }, { "model": "opensolaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "(x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "catos", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.x" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.4" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "ip8800/s,/r", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "r400 series (ax7800r series" }, { "model": "ip8800/s,/r", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "ax7700r series )" }, { "model": "ip8800/s,/r", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "s2400 series (ax2400s series )" }, { "model": "ip8800/s,/r", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "s3600 series (ax3600s series )" }, { "model": "ip8800/s,/r", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "s400 series (ax7800s series )" }, { "model": "ip8800/s,/r", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "s6300 series (ax6300s series )" }, { "model": "ip8800/s,/r", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "s6700 series (ax6700s series )" }, { "model": "gr4000", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "gs3000", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "gs4000", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ipcom series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "10.0" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.2" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.1" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.58" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.56" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.54" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.52" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.5" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.45" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.43" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.419" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.417" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.416" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.415" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.413" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.410" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.41" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.4" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "esx server patch", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5.55" }, { "model": "ucd-snmp", "scope": "eq", "trust": 0.3, "vendor": "ucd snmp", "version": "4.2.6" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise sdk 10.sp1", "scope": null, "trust": 0.3, "vendor": "suse", "version": null }, { "model": "linux enterprise sdk sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 10 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 01", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.0" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.3" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "fedora", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "6600" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "6400" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "6000" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "5700" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "5600" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "5400" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "5300" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "5100" }, { "model": "networks switched firewall series", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "5000" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.4.1" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.3.2" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.2.4" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "session and resource control appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2.0" }, { "model": "session and resource control appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1.0.1" }, { "model": "session and resource control appliance", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1.0" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.6.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.6.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.6" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.5.2" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.1" }, { "model": "siparator", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "firewalll", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.6.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.6.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.6" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.5.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.5.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.4.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.4" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.3" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.3" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.3" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "4.1.3" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.3.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2.1" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.2" }, { "model": "firewall", "scope": "eq", "trust": 0.3, "vendor": "ingate", "version": "3.1" }, { "model": "openview snmp emanate master agent", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "15" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "ecos", "scope": "eq", "trust": 0.3, "vendor": "ecoscentric", "version": "0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "wireless lan controller module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "wireless lan control", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "wireless lan control", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "wireless lan control", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "wireless lan control", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "wireless lan control", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.19" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.18" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.17" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.13" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.9" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.7" }, { "model": "wide area application services", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "nx-os", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9000" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "catos", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "application control engine module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5.11" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.3.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.1.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.15" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.13.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.11.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.17.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.5" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.11" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.0" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ace xml gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ace appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "message networking mn", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity audix r5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "intuity audix lx", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "intuity audix", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "emmc", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.021" }, { "model": "emmc", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.017" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.5" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "esx server patch", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "2.5.510" }, { "model": "net-snmp", "scope": "ne", "trust": 0.3, "vendor": "net snmp", "version": "5.4.1.1" }, { "model": "net-snmp", "scope": "ne", "trust": 0.3, "vendor": "net snmp", "version": "5.3.2.1" }, { "model": "net-snmp", "scope": "ne", "trust": 0.3, "vendor": "net snmp", "version": "5.2.4.1" }, { "model": "siparator", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.7.1" }, { "model": "firewall", "scope": "ne", "trust": 0.3, "vendor": "ingate", "version": "4.7.1" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" } ], "sources": [ { "db": "CERT/CC", "id": "VU#878044" }, { "db": "BID", "id": "29623" }, { "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "db": "CNNVD", "id": "CNNVD-200806-140" }, { "db": "NVD", "id": "CVE-2008-0960" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-0960" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wes Hardaker", "sources": [ { "db": "CNNVD", "id": "CNNVD-200806-140" } ], "trust": 0.6 }, "cve": "CVE-2008-0960", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2008-0960", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-31085", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-0960", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#878044", "trust": 0.8, "value": "7.56" }, { "author": "CNNVD", "id": "CNNVD-200806-140", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-31085", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2008-0960", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#878044" }, { "db": "VULHUB", "id": "VHN-31085" }, { "db": "VULMON", "id": "CVE-2008-0960" }, { "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "db": "CNNVD", "id": "CNNVD-200806-140" }, { "db": "NVD", "id": "CVE-2008-0960" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. SNMPv3 The implementation of contains an authentication bypass vulnerability because it does not properly handle crafted packets. SNMP (Simple Network Management Protocol) Is a widely used protocol for monitoring and managing network devices. SNMPv3 Supports security features such as authentication and privacy control. SNMPv3 In the authentication of HMAC (keyed-Hash Message Authentication Code) Is used. This code is generated by combining a private key and a cryptographic hash function. SNMPv3 Depending on the implementation of, there is a possibility that authentication may be bypassed by processing specially crafted packets due to vulnerability in authentication processing.By remote third party SNMP The object may be read or modified. Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error. \nSuccessfully exploiting this issue will allow attackers to gain unauthorized access to the affected application. \nNet-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. Vulnerabilities exist in Net-SNMP\u0027s handling of authentication. Net-SNMP\u0027s authentication code depends on the length of the HMAC length specified in the user input to read the length to be checked. If the user provides a single-byte HMAC code in the authentication code field, only the first byte will be checked, so there will be a 1/256 probability of matching the correct HMAC and Through authentication, this greatly improves the success rate of brute force guessing. An attacker could exploit this vulnerability to read and modify any SNMP object accessible using the authenticated credentials logged into the system. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2008-0017\nSynopsis: Updated ESX packages for libxml2, ucd-snmp, libtiff\nIssue date: 2008-10-31\nUpdated on: 2008-10-31 (initial release of advisory)\nCVE numbers: CVE-2008-3281 CVE-2008-0960 CVE-2008-2327\n- ------------------------------------------------------------------------\n\n1. Summary\n\n Updated ESX packages for libxml2, ucd-snmp, libtiff. \n\n2. Relevant releases\n\n ESX 3.0.3 without patch ESX303-200810503-SG\n ESX 3.0.2 without patch ESX-1006968\n ESX 2.5.5 before Upgrade Patch 10\n ESX 2.5.4 before Upgrade Patch 21\n\n NOTE: Extended support (Security and Bug fixes) for ESX 3.0.2 ended\n on 2008-10-29. Extended support (Security and Bug fixes) for\n ESX 2.5.4 ended on 2008-10-08. \n\n Extended support for ESX 3.0.2 Update 1 ends on 2009-08-08. Users\n should plan to upgrade to ESX 3.0.3 and preferably to the newest\n release available. \n\n3. Problem Description\n\n a. Updated ESX Service Console package libxml2\n\n A denial of service flaw was found in the way libxml2 processes\n certain content. If an application that is linked against\n libxml2 processes malformed XML content, the XML content might\n cause the application to stop responding. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2008-3281 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX ESX303-200810503-SG\n ESX 3.0.2 ESX ESX-1006968\n ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 10 or later\n ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 21\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n b. Updated ESX Service Console package ucd-snmp\n\n A flaw was found in the way ucd-snmp checks an SNMPv3 packet\u0027s\n Keyed-Hash Message Authentication Code. An attacker could use\n this flaw to spoof an authenticated SNMPv3 packet. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2008-0960 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX not affected\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX not affected\n ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 10 or later\n ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 21\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n c. Updated third party library libtiff\n\n Multiple uses of uninitialized values were discovered in libtiff\u0027s\n Lempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker\n could create a carefully crafted LZW-encoded TIFF file that would\n cause an application linked with libtiff to crash or, possibly,\n execute arbitrary code. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2008-2327 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX not affected\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX not affected\n ESX 2.5.5 ESX ESX 2.5.5 upgrade patch 10 or later\n ESX 2.5.4 ESX ESX 2.5.4 upgrade patch 21\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n ESX\n ---\n ESX 3.0.3 patch ESX303-200810503-SG\n http://download3.vmware.com/software/vi/ESX303-200810503-SG.zip\n md5sum: e687313e58377be41f6e6b767dfbf268\n http://kb.vmware.com/kb/1006971\n\n ESX 3.0.2 patch ESX-1006968\n http://download3.vmware.com/software/vi/ESX-1006968.tgz\n md5sum: fc9e30cff6f03a209e6a275254fa6719\n http://kb.vmware.com/kb/1006968\n\n VMware ESX 2.5.5 Upgrade Patch 10\n http://download3.vmware.com/software/esx/esx-2.5.5-119702-upgrade.tar.gz\n md5sum: 2ee87cdd70b1ba84751e24c0bd8b4621\n http://vmware.com/support/esx25/doc/esx-255-200810-patch.html\n\n VMware ESX 2.5.4 Upgrade Patch 21\n http://download3.vmware.com/software/esx/esx-2.5.4-119703-upgrade.tar.gz\n md5sum: d791be525c604c852a03dd7df0eabf35\n http://vmware.com/support/esx25/doc/esx-254-200810-patch.html\n\n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2008-10-31 VMSA-2008-0017\nInitial security advisory after release of ESX 3.0.3, ESX 3.0.2, ESX\n2.5.5 and ESX 2.5.4 patches on 2008-10-30. \n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2008 VMware Inc. All rights reserved. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200808-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Net-SNMP: Multiple vulnerabilities\n Date: August 06, 2008\n Bugs: #222265, #225105\n ID: 200808-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Net-SNMP allow for authentication bypass in\nsnmpd and execution of arbitrary code in Perl applications using\nNet-SMNP. \n\nBackground\n==========\n\nNet-SNMP is a collection of tools for generating and retrieving SNMP\ndata. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-analyzer/net-snmp \u003c 5.4.1.1 \u003e= 5.4.1.1\n\nDescription\n===========\n\nWes Hardaker reported that the SNMPv3 HMAC verification relies on the\nclient to specify the HMAC length (CVE-2008-0960). John Kortink\nreported a buffer overflow in the Perl bindings of Net-SNMP when\nprocessing the OCTETSTRING in an attribute value pair (AVP) received by\nan SNMP agent (CVE-2008-2292). \n\nImpact\n======\n\nAn attacker could send SNMPv3 packets to an instance of snmpd providing\na valid user name and an HMAC length value of 1, and easily conduct\nbrute-force attacks to bypass SNMP authentication. An attacker could\nfurther entice a user to connect to a malicious SNMP agent with an SNMP\nclient using the Perl bindings, possibly resulting in the execution of\narbitrary code. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Net-SNMP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-analyzer/net-snmp-5.4.1.1\"\n\nReferences\n==========\n\n [ 1 ] CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n [ 2 ] CVE-2008-2292\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200808-02.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. \n\nLicense\n=======\n\nCopyright 2008 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n______________________________________________________________________________\n\n SUSE Security Announcement\n\n Package: net-snmp\n Announcement ID: SUSE-SA:2008:039\n Date: Fri, 01 Aug 2008 13:00:00 +0000\n Affected Products: openSUSE 10.2\n openSUSE 10.3\n openSUSE 11.0\n SUSE SLES 9\n Novell Linux Desktop 9\n Open Enterprise Server\n Novell Linux POS 9\n SUSE Linux Enterprise Desktop 10 SP1\n SLE SDK 10 SP1\n SLE SDK 10 SP2\n SUSE Linux Enterprise Server 10 SP1\n SUSE Linux Enterprise Desktop 10 SP2\n SUSE Linux Enterprise Server 10 SP2\n Vulnerability Type: authentication bypass, denial-of-service\n Severity (1-10): 6\n SUSE Default Package: no\n Cross-References: CVE-2008-0960\n CVE-2008-2292\n\n Content of This Advisory:\n 1) Security Vulnerability Resolved:\n - authentication bypass\n - denial-of-service\n Problem Description\n 2) Solution or Work-Around\n 3) Special Instructions and Notes\n 4) Package Location and Checksums\n 5) Pending Vulnerabilities, Solutions, and Work-Arounds:\n - viewvc/subversion\n 6) Authenticity Verification and Additional Information\n\n______________________________________________________________________________\n\n1) Problem Description and Brief Discussion\n\n The net-snmp daemon implements the \"simple network management protocol\". \n The version 3 of SNMP as implemented in net-snmp uses the length of the\n HMAC in a packet to verify against a local HMAC for authentication. \n An attacker can therefore send a SNMPv3 packet with a one byte HMAC and\n guess the correct first byte of the local HMAC with 256 packets (max). \n\n Additionally a buffer overflow in perl-snmp was fixed that can cause a\n denial-of-service/crash. \n\n2) Solution or Work-Around\n\n Please install the update package. \n\n3) Special Instructions and Notes\n\n Please restart net-snmp after the update. \n\n4) Package Location and Checksums\n\n The preferred method for installing security updates is to use the YaST\n Online Update (YOU) tool. YOU detects which updates are required and\n automatically performs the necessary steps to verify and install them. \n Alternatively, download the update packages for your distribution manually\n and verify their integrity by the methods listed in Section 6 of this\n announcement. Then install the packages using the command\n\n rpm -Fhv \u003cfile.rpm\u003e\n\n to apply the update, replacing \u003cfile.rpm\u003e with the filename of the\n downloaded RPM package. \n\n \n x86 Platform:\n \n openSUSE 11.0:\n http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libsnmp15-5.4.1-77.2.i586.rpm\n http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-5.4.1-77.2.i586.rpm\n http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-devel-5.4.1-77.2.i586.rpm\n http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/perl-SNMP-5.4.1-77.2.i586.rpm\n http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/snmp-mibs-5.4.1-77.2.i586.rpm\n \n openSUSE 10.3:\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libsnmp15-5.4.1-19.2.i586.rpm\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-5.4.1-19.2.i586.rpm\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-devel-5.4.1-19.2.i586.rpm\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/perl-SNMP-5.4.1-19.2.i586.rpm\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/snmp-mibs-5.4.1-19.2.i586.rpm\n \n openSUSE 10.2:\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/net-snmp-5.4.rc2-8.i586.rpm\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/net-snmp-devel-5.4.rc2-8.i586.rpm\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/perl-SNMP-5.4.rc2-8.i586.rpm\n \n x86-64 Platform:\n \n openSUSE 11.0:\n http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/net-snmp-32bit-5.4.1-77.2.x86_64.rpm\n \n openSUSE 10.3:\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/net-snmp-32bit-5.4.1-19.2.x86_64.rpm\n \n openSUSE 10.2:\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/net-snmp-32bit-5.4.rc2-8.x86_64.rpm\n \n Sources:\n \n openSUSE 11.0:\n http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/net-snmp-5.4.1-77.2.src.rpm\n \n openSUSE 10.3:\n http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/net-snmp-5.4.1-19.2.src.rpm\n \n openSUSE 10.2:\n ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/net-snmp-5.4.rc2-8.src.rpm\n \n Our maintenance customers are notified individually. The packages are\n offered for installation from the maintenance web:\n \n Open Enterprise Server\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n Novell Linux POS 9\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n Novell Linux Desktop 9\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n SUSE Linux Enterprise Server 10 SP1\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n SUSE Linux Enterprise Server 10 SP2\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n SLE SDK 10 SP2\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n SLE SDK 10 SP1\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n SUSE Linux Enterprise Desktop 10 SP1\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n SUSE Linux Enterprise Desktop 10 SP2\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n \n SUSE SLES 9\n http://download.novell.com/index.jsp?search=Search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848\n\n______________________________________________________________________________\n\n5) Pending Vulnerabilities, Solutions, and Work-Arounds:\n\n - viewvc/subversion\n This update of subversion fixes multiple vulnerabilities. \n - CVE-2008-1290: list CVS or SVN commits on \"all-forbidden\" files\n - CVE-2008-1291: directly access hidden CVSROOT folders\n - CVE-2008-1292: expose restricted content via the revision view,\n the log history, or the diff view\n\n______________________________________________________________________________\n\n6) Authenticity Verification and Additional Information\n\n - Announcement authenticity verification:\n\n SUSE security announcements are published via mailing lists and on Web\n sites. The authenticity and integrity of a SUSE security announcement is\n guaranteed by a cryptographic signature in each announcement. All SUSE\n security announcements are published with a valid signature. \n\n To verify the signature of the announcement, save it as text into a file\n and run the command\n\n gpg --verify \u003cfile\u003e\n\n replacing \u003cfile\u003e with the name of the file where you saved the\n announcement. The output for a valid signature looks like:\n\n gpg: Signature made \u003cDATE\u003e using RSA key ID 3D25D3D9\n gpg: Good signature from \"SuSE Security Team \u003csecurity@suse.de\u003e\"\n\n where \u003cDATE\u003e is replaced by the date the document was signed. \n\n If the security team\u0027s key is not contained in your key ring, you can\n import it from the first installation CD. To import the key, use the\n command\n\n gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc\n\n - Package authenticity verification:\n\n SUSE update packages are available on many mirror FTP servers all over the\n world. While this service is considered valuable and important to the free\n and open source software community, the authenticity and the integrity of\n a package needs to be verified to ensure that it has not been tampered\n with. \n\n The internal rpm package signatures provide an easy way to verify the\n authenticity of an RPM package. Use the command\n\n rpm -v --checksig \u003cfile.rpm\u003e\n\n to verify the signature of the package, replacing \u003cfile.rpm\u003e with the\n filename of the RPM package downloaded. The package is unmodified if it\n contains a valid signature from build@suse.de with the key ID 9C800ACA. \n\n This key is automatically imported into the RPM database (on\n RPMv4-based distributions) and the gpg key ring of \u0027root\u0027 during\n installation. You can also find it on the first installation CD and at\n the end of this announcement. \n\n - SUSE runs two security mailing lists to which any interested party may\n subscribe:\n\n opensuse-security@opensuse.org\n - General Linux and SUSE security discussion. \n All SUSE security announcements are sent to this list. \n To subscribe, send an e-mail to\n \u003copensuse-security+subscribe@opensuse.org\u003e. \n\n opensuse-security-announce@opensuse.org\n - SUSE\u0027s announce-only mailing list. \n Only SUSE\u0027s security announcements are sent to this list. \n To subscribe, send an e-mail to\n \u003copensuse-security-announce+subscribe@opensuse.org\u003e. \n\n =====================================================================\n SUSE\u0027s security contact is \u003csecurity@suse.com\u003e or \u003csecurity@suse.de\u003e. \n The \u003csecurity@suse.de\u003e public key is listed below. \n =====================================================================\n______________________________________________________________________________\n\n The information in this advisory may be distributed or reproduced,\n provided that the advisory is not modified in any way. In particular, the\n clear text signature should show proof of the authenticity of the text. \n\n SUSE Linux Products GmbH provides no warranties of any kind whatsoever\n with respect to the information contained in this security advisory. \n\nType Bits/KeyID Date User ID\npub 2048R/3D25D3D9 1999-03-06 SuSE Security Team \u003csecurity@suse.de\u003e\npub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key \u003cbuild@suse.de\u003e\n\n- -----BEGIN PGP PUBLIC KEY BLOCK-----\nVersion: GnuPG v1.4.2 (GNU/Linux)\n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\n=ypVs\n- -----END PGP PUBLIC KEY BLOCK-----\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (GNU/Linux)\n\niQEVAwUBSJL0gHey5gA9JdPZAQI4IAf7BPqInfbAyzZObcX2vGZM0svDKclNQMAO\n1tTE0O3Te0EYLOnkfEisqNe9AOioSUQqeWu7ud5Y8L5zVysmcGe3/Lg0Vqmie/he\nWJXCJtkvaPOcp7p/GcnWQByQ4T1cQ4+QoLhwg2+RpyAABn/7ZWBz+uG91134kOql\nJabvxLI05Le++uwFfJ0YEefkSzik9sMVz4Dk4eVJglMm6nioHnx6K6ZrR0+0HBRR\nz2Rczq0M3gYplfWpgydgtlFH4dhkXlhfuladf93Aagf6QWerwvxTEld7ti+Sx3dU\nuInx4nkLJHLeu1f/XD4i7ZpZ0DtBz0F9wWJFGmy2cXxW0Xnhtwdbnw==\n=QwLq\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ===========================================================\nUbuntu Security Notice USN-685-1 December 03, 2008\nnet-snmp vulnerabilities\nCVE-2008-0960, CVE-2008-2292, CVE-2008-4309\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 7.10\nUbuntu 8.04 LTS\nUbuntu 8.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n libsnmp-perl 5.2.1.2-4ubuntu2.3\n libsnmp9 5.2.1.2-4ubuntu2.3\n\nUbuntu 7.10:\n libsnmp-perl 5.3.1-6ubuntu2.2\n libsnmp10 5.3.1-6ubuntu2.2\n\nUbuntu 8.04 LTS:\n libsnmp-perl 5.4.1~dfsg-4ubuntu4.2\n libsnmp15 5.4.1~dfsg-4ubuntu4.2\n\nUbuntu 8.10:\n libsnmp15 5.4.1~dfsg-7.1ubuntu6.1\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nWes Hardaker discovered that the SNMP service did not correctly validate\nHMAC authentication requests. An unauthenticated remote attacker\ncould send specially crafted SNMPv3 traffic with a valid username\nand gain access to the user\u0027s views without a valid authentication\npassphrase. (CVE-2008-0960)\n\nJohn Kortink discovered that the Net-SNMP Perl module did not correctly\ncheck the size of returned values. If a user or automated system were\ntricked into querying a malicious SNMP server, the application using\nthe Perl module could be made to crash, leading to a denial of service. \nThis did not affect Ubuntu 8.10. (CVE-2008-2292)\n\nIt was discovered that the SNMP service did not correctly handle large\nGETBULK requests. If an unauthenticated remote attacker sent a specially\ncrafted request, the SNMP service could be made to crash, leading to a\ndenial of service. (CVE-2008-4309)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz\n Size/MD5: 75402 9655d984a47cec8e27efa4db0b227870\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc\n Size/MD5: 838 17a17230a005c1acfd0569757e728fad\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz\n Size/MD5: 3869893 34159770a7fe418d99fdd416a75358b1\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb\n Size/MD5: 1152306 f7647cee4df8db87ab48c0d05635a973\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb\n Size/MD5: 822946 b9b852c188937d1fffc06d4da01325d5\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 896620 a78012b3f0f13667081f97dc1a4d62e8\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 1497194 7d55b8d1e4ae0c45753bedcf536a1a5a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 1826252 0550c1401f9bbe5f345fd96484ed369c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 889330 5ad0ddb2c610973166e4dd07769ba3d3\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 797086 18cf4210342b683d3ee24fe995329b55\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 896880 298d27ea1ece6e80bb8931b9a5e61961\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 1268472 acbca43ab7ea747fa3e4636d15ef997c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 1710342 bd27290685bcf1d6a23eb8705d3367e7\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 881838 58121bd9e4c845da7df4e540645e0e13\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 794672 221d1c554bd89f50dc3ac9108a6cef6b\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 913064 45a033b01c4b31ef90a92988bb5fb229\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 1590124 b62aa5477d9307d311c811298b7ec3d9\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 1728094 5214ce9aebe3a8d7a28a1746a81ce8ea\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 898580 86e6c1b5dfb5bf91f63d7c6786b7abae\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 796092 1bab28407224f782b2c3ae04b4647333\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 896832 3d233db9682d5654fdad6bc6b5a649ba\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 1485268 064304ead0ca4653136376e8e9039e74\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 1706490 cb76027eb8167e0866a81b93a4da28ed\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 883182 d1ffc12427d92be51efdba3349e74f9a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 796374 0f3f749ebe4af6111fe49316639004e4\n\nUpdated packages for Ubuntu 7.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz\n Size/MD5: 94646 8b6f9380d9f8c5514a1d4db729c6df04\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc\n Size/MD5: 1287 f53866efd3ae4f3c939a77b1005e1f11\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz\n Size/MD5: 4210843 360a9783dbc853bab6bda90d961daee5\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb\n Size/MD5: 484306 f2d03276d1cdcef7e8b276ad8ca9595d\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb\n Size/MD5: 901284 6889b371d4de92eb61bf83b89d8a8c37\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 2541692 1e6de4bd3c3baa444a2e1980a593a40e\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 968940 7efe4bdcb99f311f1c4bb2c3b9d24a4e\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 1200930 821861c24499cfdfa2a82c329c610c16\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 996572 00cc1a4c8c7924124984e666563e73d0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 908792 a40763280a3bdbe60eca5e07c5d6c30c\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 2321524 59d44616802197e1227cf88abddefe36\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 967106 a6e5b308d889bdf6f5abe454e35ba474\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 1124462 ec99daa26d0fafba6e9f0b874a23bf3d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 991956 cb20b6a4d68a858ffa0846431169d411\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 907546 1ab5119e23a16e99203c113d49fc2723\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 2305548 da57690a3327196e0c3684735be23f2e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 968984 8da336a5fd871be10e6b8d66d3b9c9d3\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 1074500 e4d6690a6a6a543fc0244a29cd350c9b\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 989566 2d2f4b1662e6a2dffafe8e98f00a15e7\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 907596 4274e006754ebc836132166e0f0429a0\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 2641202 9b2ec56463ee715752b780aa332d8cd0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 985722 a2fca8426b7b51e98c39b91a468bf71f\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 1154496 6073239f7ffead2a5b9c3357ada1602c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 1018596 af12cc55597a0d2d3a92b4b5d683bb14\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 911866 57e2246930e712bdc1b039840d43af48\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 2527568 19b1a0971259a9b99f9c0386f5935bfc\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 970264 d8ae7f0bb10375ad487b14ba031cd013\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 1078842 2401fc4c40352b8c8013e8c5de3b0ecd\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 995228 16b230d3c718d8eb4a023126bd09d7f5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 908708 1e410a8ddac41ad9faec901c5a638f29\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz\n Size/MD5: 78642 b4acf50e47be498e579b934f32081d25\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc\n Size/MD5: 1447 0abcea5df87851df2aae7ebd1fc00e7a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz\n Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb\n Size/MD5: 526864 f3a131bf5a4f5c547573430cb66d410c\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb\n Size/MD5: 102072 2f276f50efdb7e34f7e61f132f7f7cd7\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 1796950 283c5a95206ab74062e0e30eba4e0890\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 142522 9fff294368a7eac39e37fa478ac6609d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 1296694 d0646a1543c51f14a93b40f972bc1569\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 163178 0378a25e3b2a0bc80ddb8ec720b5557d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 75960 fcba461f2e2376cad515329791e04a17\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 38512 21d9ecbc86a8e5965047d027e94fd324\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 1556806 39e4f63b841c4b36c022017d66c12f58\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 179478 5f08596ae997792920e238ff8cd2a7ba\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 1098794 38bc61a5b403fb4f626a641a5f13e681\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 157954 66e38c37639f3c68e7e4a933fa953ff3\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 74116 50b3a4d0cfd38585d2711d30cf725e9d\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 75038 98cdeec4b1014568b00107a82fc74418\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 1552018 d9dcab084f3b9bf3e8c36cb5db8f141e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 141508 96061180809cccc975e0d7079e07ed3e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 1171530 2d91048fe0a2ac9e3a4fddb84c67513e\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 155564 c67ba3aeb2535ee3e7fc4c89e90ba36a\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 74274 db05202893f516398bbe4e2153ef2d6e\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 35552 a75caf212ffb5a0eafe4ba2656c9aae1\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 1874428 0ed8b5f4e6bad74d506d73447de00bd2\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 158374 dfcd7c4455b4bbd3f746368058d09a59\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 1238226 b5b3a81e956cdb14674d571694d1b6d0\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 185314 5e9d8bd56493f75ae8a8691c530aa420\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 83106 75dea32ec7152b7868fabf09d9d5a198\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 42928 214fe703fced2e387b48b51dcbb1d6b7\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 1760062 ade4c08289d947d092a5b2ab06517cc7\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 143860 62b7260d618531b0ed5e7871ab7b99a9\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 1159702 28ea81660bbdd9d7982be58d225e8814\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 160236 196e493ce73905446a3764e73b99f332\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 75518 f24e4b0e3e4a7d97c28da99cdc0a47a5\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 38240 873f5e820e381ec2254ed520bcd09af0\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz\n Size/MD5: 82260 85fb58aa81933f142bd937bca2e18341\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc\n Size/MD5: 1956 1ee06f6b731eae435af6a2d438ef909b\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz\n Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb\n Size/MD5: 527650 9c56f3d70018b714895a61c0daba9498\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb\n Size/MD5: 103060 108eb50387ca46b4ee38ebb8722ced88\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 1815638 82385081fe2d4eeb1a6c94f9dae672ad\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 146154 1b6249e02e89213f2f4d2aa9c9123420\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 1315628 8443e091f2c63485a422236ad23e55cd\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 165522 154a05824b98e041ceac60ac83709ef4\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 77914 8d6e328f309e78bf1fcf21c2633d82ec\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 39930 6b7a1a67ca63b5c843ce66f3547b3c89\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 1569568 dd0599b150eccee9889325d17a7b0769\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 184264 52a54aebef81648164a5bc90f27b0cc5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 1119072 10c81fe283b25e7ad31fcfd88a2325f0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 156112 6296f0836bc9797ff48810c79965c3a5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 74476 bd96a6915eb97fed083aac4daa5f07cf\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 77652 3e30e51c362dfa982a3b3197be081328\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 1557614 065f4575c7a2d257fa6b5b9d0cee454f\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 144292 b55f2c4aff8a86499d7f38fd6e773f44\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 1184272 84116fefdce279ce338ffc9614384c06\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 154444 ffe9e765a01695355bdb58008a2910f5\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 73746 762e75672fbd395d2d159513f5d572b0\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 36530 0a98b51b94a5f75d4131d657aa766579\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 1884632 a3ad023841ee605efa1e055712b44d9a\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 161074 5586adea8200d2d5bf81f288b5bf7be2\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 1249636 48ec688499fea1dc0ccb3091c0158fb8\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 181952 8ef5f6b9b6c6b8e4fcd5cb37147304a2\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 81802 965218126fb5a49cfcd9e20afeb49782\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 43048 09f2f9ed9f519ca5723411802e46d48b\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 1759316 46455cc355c1b808243eada0f134d00b\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 145164 2cdb5b35db853c7c184a44022fc23cd8\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 1159834 cfff424e5bff38bb3ef9419f03465388\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 163042 354f7a5423a34c411c5f8620c66d3e58\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 76994 ca11bcf9a411f618e35e1d6b6ab8c8f9\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 38526 172493ec5df1866e2633e074c7f38775\n\n. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 8db66ef5a5468d3fd72a47855230a28e 2007.1/i586/libnet-snmp10-5.3.1-3.2mdv2007.1.i586.rpm\n c951b17138ef11828b2ccf031d4cddaf 2007.1/i586/libnet-snmp10-devel-5.3.1-3.2mdv2007.1.i586.rpm\n 536a87919f32fac81964d0a907bf08fe 2007.1/i586/libnet-snmp10-static-devel-5.3.1-3.2mdv2007.1.i586.rpm\n 39e33947c21666dac5dbe5cfe103b26d 2007.1/i586/net-snmp-5.3.1-3.2mdv2007.1.i586.rpm\n 1eed5ebaff8f6f83befbf8d831900073 2007.1/i586/net-snmp-mibs-5.3.1-3.2mdv2007.1.i586.rpm\n 874db03c69584025e4d91049072d3c4e 2007.1/i586/net-snmp-trapd-5.3.1-3.2mdv2007.1.i586.rpm\n 11af93c879d8cd9353b7cb1826900222 2007.1/i586/net-snmp-utils-5.3.1-3.2mdv2007.1.i586.rpm\n 2c9e819eeb5fd472f6a0fe338d86182b 2007.1/i586/perl-NetSNMP-5.3.1-3.2mdv2007.1.i586.rpm \n 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n aa27de502ce22110fd745c0b847b79d9 2007.1/x86_64/lib64net-snmp10-5.3.1-3.2mdv2007.1.x86_64.rpm\n 1843dd154c443cca9ae977e502221d6d 2007.1/x86_64/lib64net-snmp10-devel-5.3.1-3.2mdv2007.1.x86_64.rpm\n 838bd7820d446bd947bc46e090b38066 2007.1/x86_64/lib64net-snmp10-static-devel-5.3.1-3.2mdv2007.1.x86_64.rpm\n e659d3df04816330c7bf45008f66bc27 2007.1/x86_64/net-snmp-5.3.1-3.2mdv2007.1.x86_64.rpm\n 756d5606a1039d20a7512b0a109d53bb 2007.1/x86_64/net-snmp-mibs-5.3.1-3.2mdv2007.1.x86_64.rpm\n 8ad36943e07362865f3a48c99914e48c 2007.1/x86_64/net-snmp-trapd-5.3.1-3.2mdv2007.1.x86_64.rpm\n 483140c06017507127d12357c3ed2b41 2007.1/x86_64/net-snmp-utils-5.3.1-3.2mdv2007.1.x86_64.rpm\n e2bb901815ffa1ca5b0a16bc1363f84f 2007.1/x86_64/perl-NetSNMP-5.3.1-3.2mdv2007.1.x86_64.rpm \n 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 8de3c4975620db2b2c2697d6f9deb79b 2008.0/i586/libnet-snmp15-5.4.1-1.1mdv2008.0.i586.rpm\n b1991c58d996f4be200fe141e28c5f7d 2008.0/i586/libnet-snmp-devel-5.4.1-1.1mdv2008.0.i586.rpm\n 03c54182cc7f97633f29ff0251a8c898 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.1mdv2008.0.i586.rpm\n 1f792de19b7b38b56d68242958d5d800 2008.0/i586/net-snmp-5.4.1-1.1mdv2008.0.i586.rpm\n e3362a641e232a6ecf0b8230f0e49ec8 2008.0/i586/net-snmp-mibs-5.4.1-1.1mdv2008.0.i586.rpm\n bc6d8c10135ea64a4d512d80d04b1b39 2008.0/i586/net-snmp-trapd-5.4.1-1.1mdv2008.0.i586.rpm\n 8e7f28ee85fb48129eea57d11d391c8b 2008.0/i586/net-snmp-utils-5.4.1-1.1mdv2008.0.i586.rpm\n beab129e378f61a6bf62d366a4d90639 2008.0/i586/perl-NetSNMP-5.4.1-1.1mdv2008.0.i586.rpm \n 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 82b570c9cb7e0662df4d7da730c131db 2008.0/x86_64/lib64net-snmp15-5.4.1-1.1mdv2008.0.x86_64.rpm\n 20b8a6e3fc8dd82fe5ecfdb337553938 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.1mdv2008.0.x86_64.rpm\n 555688caa0eee850b3a5f835a5778849 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.1mdv2008.0.x86_64.rpm\n 60d65f80aec29dcb6d4ceb4bb117a9bc 2008.0/x86_64/net-snmp-5.4.1-1.1mdv2008.0.x86_64.rpm\n 685c9dd25b585afc128de1b3c092e5d5 2008.0/x86_64/net-snmp-mibs-5.4.1-1.1mdv2008.0.x86_64.rpm\n 7bff860904572c092f737ac17940d5b2 2008.0/x86_64/net-snmp-trapd-5.4.1-1.1mdv2008.0.x86_64.rpm\n e434686bddfb04f2a8bd01346517ecb4 2008.0/x86_64/net-snmp-utils-5.4.1-1.1mdv2008.0.x86_64.rpm\n 4fab6e498e1f05809db500ce895aad66 2008.0/x86_64/perl-NetSNMP-5.4.1-1.1mdv2008.0.x86_64.rpm \n 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.1:\n 4bafceae1a29f6557b5aa884eca24ba0 2008.1/i586/libnet-snmp15-5.4.1-5.1mdv2008.1.i586.rpm\n 1eedbae5df7e503de1cba736129beaa1 2008.1/i586/libnet-snmp-devel-5.4.1-5.1mdv2008.1.i586.rpm\n 615a88847cbf1ce6eaf0029037a14b1b 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.1mdv2008.1.i586.rpm\n 7323cb7d35eb67664d40ad73b413679d 2008.1/i586/net-snmp-5.4.1-5.1mdv2008.1.i586.rpm\n d43ed96a806639a94af2a137c75e276e 2008.1/i586/net-snmp-mibs-5.4.1-5.1mdv2008.1.i586.rpm\n 7394b1361b43056b5eb99827771358cf 2008.1/i586/net-snmp-tkmib-5.4.1-5.1mdv2008.1.i586.rpm\n 8d6fd9308c2edbe8c020d2c33b3a841d 2008.1/i586/net-snmp-trapd-5.4.1-5.1mdv2008.1.i586.rpm\n dc58047a02e1a222af20aa794ea8f447 2008.1/i586/net-snmp-utils-5.4.1-5.1mdv2008.1.i586.rpm\n 2ad9888cd61fc4952c1cee0c48f714b5 2008.1/i586/perl-NetSNMP-5.4.1-5.1mdv2008.1.i586.rpm \n 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n 618c241e0ecb57685646264c9bb083b4 2008.1/x86_64/lib64net-snmp15-5.4.1-5.1mdv2008.1.x86_64.rpm\n bb0ebf49ee7cca29965aeb398f4725f6 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.1mdv2008.1.x86_64.rpm\n b4f29f00773291f6cc00784ed7cde470 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.1mdv2008.1.x86_64.rpm\n 3039811b6682dc4009b32ff48a99eb2b 2008.1/x86_64/net-snmp-5.4.1-5.1mdv2008.1.x86_64.rpm\n fab09178635501eb5d6a82eb7bd532a3 2008.1/x86_64/net-snmp-mibs-5.4.1-5.1mdv2008.1.x86_64.rpm\n da29d4c7edaa15d95f8bee98dbfab025 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.1mdv2008.1.x86_64.rpm\n d9aad834d82d310c64f6f21e17a55920 2008.1/x86_64/net-snmp-trapd-5.4.1-5.1mdv2008.1.x86_64.rpm\n 7a7c871bd87dc91c16b046ac115cda70 2008.1/x86_64/net-snmp-utils-5.4.1-5.1mdv2008.1.x86_64.rpm\n d102ea2af0fcaaebd98defda72bcfc91 2008.1/x86_64/perl-NetSNMP-5.4.1-5.1mdv2008.1.x86_64.rpm \n 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm\n\n Corporate 3.0:\n 335af3930865c8eb44ef436cad5fb373 corporate/3.0/i586/libnet-snmp5-5.1-7.4.C30mdk.i586.rpm\n b8e1d307ee6fa3905d292077fc063318 corporate/3.0/i586/libnet-snmp5-devel-5.1-7.4.C30mdk.i586.rpm\n a668cc4de411865567d1a93f34cee1e3 corporate/3.0/i586/libnet-snmp5-static-devel-5.1-7.4.C30mdk.i586.rpm\n d8c0d342b03e5719443d2de06c631bd5 corporate/3.0/i586/libsnmp0-4.2.3-8.2.C30mdk.i586.rpm\n 6bbe3bb2502ce3c974f7b5737331bb4d corporate/3.0/i586/libsnmp0-devel-4.2.3-8.2.C30mdk.i586.rpm\n daca10f2e578f75c1e7415d78ed30265 corporate/3.0/i586/net-snmp-5.1-7.4.C30mdk.i586.rpm\n 1630ebd75201e1bc3956b12a26282f92 corporate/3.0/i586/net-snmp-mibs-5.1-7.4.C30mdk.i586.rpm\n 5a4f483c877a6278088a265cb3273d61 corporate/3.0/i586/net-snmp-trapd-5.1-7.4.C30mdk.i586.rpm\n 316d866de7fa7cd984d58f5cb742f5e3 corporate/3.0/i586/net-snmp-utils-5.1-7.4.C30mdk.i586.rpm\n e3d4197517565f12e2c3a8fd1cc5d2e7 corporate/3.0/i586/ucd-snmp-4.2.3-8.2.C30mdk.i586.rpm\n 17e8d856fd1dac18552818a842105c88 corporate/3.0/i586/ucd-snmp-utils-4.2.3-8.2.C30mdk.i586.rpm \n ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm\n 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n b31f277942fca76d953007c94a60cae2 corporate/3.0/x86_64/lib64net-snmp5-5.1-7.4.C30mdk.x86_64.rpm\n e4a3fba10ccdd805dc8783ae68c99a42 corporate/3.0/x86_64/lib64net-snmp5-devel-5.1-7.4.C30mdk.x86_64.rpm\n 530a94cc87af0e4d6e9f3815473c0dd4 corporate/3.0/x86_64/lib64net-snmp5-static-devel-5.1-7.4.C30mdk.x86_64.rpm\n f246ca421b5d16c599d53f70e4b97660 corporate/3.0/x86_64/lib64snmp0-4.2.3-8.2.C30mdk.x86_64.rpm\n b943e07726a2fecb016ef4ba626906d8 corporate/3.0/x86_64/lib64snmp0-devel-4.2.3-8.2.C30mdk.x86_64.rpm\n 22822876f72e35cf6d1ed027df93e74a corporate/3.0/x86_64/net-snmp-5.1-7.4.C30mdk.x86_64.rpm\n e7e51782b9bbd1e1bdf93c17fb953280 corporate/3.0/x86_64/net-snmp-mibs-5.1-7.4.C30mdk.x86_64.rpm\n e67a9105f9492c020693d48ce55652ea corporate/3.0/x86_64/net-snmp-trapd-5.1-7.4.C30mdk.x86_64.rpm\n 171a17e507b2dfdb9c70c0089e582221 corporate/3.0/x86_64/net-snmp-utils-5.1-7.4.C30mdk.x86_64.rpm\n 96886146d21175b076e92d59e96f5016 corporate/3.0/x86_64/ucd-snmp-4.2.3-8.2.C30mdk.x86_64.rpm\n 1b6ee4c253f15be516a1928a4f791f15 corporate/3.0/x86_64/ucd-snmp-utils-4.2.3-8.2.C30mdk.x86_64.rpm \n ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm\n 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm\n\n Corporate 4.0:\n 6cbe9d76db3b05c2435bcbc5cf16c898 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 586a55cfde45020d5ea0ebf5f2d6c840 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm\n d992d8300cf0639942a179349d592e15 corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 03a49b848c376b705dcfcef0ec817daf corporate/4.0/i586/net-snmp-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 22b9d01b3b7a8a34ed3e1a5a435286a8 corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.i586.rpm\n dccc01a94c1f29eac2875e6a935bf589 corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 77f93230f96abce039b52ca5612eaa36 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 8a7209b70979c9d73035ff40cbd8dbb4 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.i586.rpm \n ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n f94c7e967973ba8aa12b5605251d6e78 corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n f332985986eff2d6c8a75b5c263dedb1 corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 82fc454916e75866370ee738292021c8 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n ff0adeb23df57eb34869c7100df159da corporate/4.0/x86_64/net-snmp-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 72f2dc9cb1695999660a9ff9c97e4c47 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 0f244551c87e051a8274e5050cf0bc2a corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 7c4e7fb304c77c6551a50495d338e84e corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 68d81ca4c173710ef43b36092df2a6ee corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.x86_64.rpm \n ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm\n\n Multi Network Firewall 2.0:\n f98286a301d580fe306917cf0169ef88 mnf/2.0/i586/libnet-snmp5-5.1-7.4.M20mdk.i586.rpm \n 3ba27516773b1dd933828207cecc7754 mnf/2.0/SRPMS/net-snmp-5.1-7.4.M20mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security", "sources": [ { "db": "NVD", "id": "CVE-2008-0960" }, { "db": "CERT/CC", "id": "VU#878044" }, { "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "db": "BID", "id": "29623" }, { "db": "VULHUB", "id": "VHN-31085" }, { "db": "VULMON", "id": "CVE-2008-0960" }, { "db": "PACKETSTORM", "id": "71406" }, { "db": "PACKETSTORM", "id": "68866" }, { "db": "PACKETSTORM", "id": "68741" }, { "db": "PACKETSTORM", "id": "72606" }, { "db": "PACKETSTORM", "id": "67532" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-31085", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=5790", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-31085" }, { "db": "VULMON", "id": "CVE-2008-0960" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#878044", "trust": 3.7 }, { "db": "NVD", "id": "CVE-2008-0960", "trust": 3.4 }, { "db": "OCERT", "id": "OCERT-2008-006", "trust": 2.9 }, { "db": "BID", "id": "29623", "trust": 2.9 }, { "db": "SECUNIA", "id": "30574", "trust": 2.8 }, { "db": "USCERT", "id": "TA08-162A", "trust": 2.6 }, { "db": "SECUNIA", "id": "30665", "trust": 2.0 }, { "db": "VUPEN", "id": "ADV-2008-2971", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-1788", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-1787", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-1836", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-1800", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2009-1612", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-1797", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-1801", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-1981", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-2361", "trust": 1.8 }, { "db": "EXPLOIT-DB", "id": "5790", "trust": 1.8 }, { "db": "SECUNIA", "id": "32664", "trust": 1.8 }, { "db": "SECUNIA", "id": "35463", "trust": 1.8 }, { "db": "SECUNIA", "id": "33003", "trust": 1.8 }, { "db": "SREASON", "id": "3933", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2008/06/09/1", "trust": 1.8 }, { "db": "SECTRACK", "id": "1020218", "trust": 1.8 }, { "db": "SECUNIA", "id": "30802", "trust": 1.2 }, { "db": "SECUNIA", "id": "30626", "trust": 1.2 }, { "db": "SECUNIA", "id": "31334", "trust": 1.2 }, { "db": "SECUNIA", "id": "30612", "trust": 1.2 }, { "db": "SECUNIA", "id": "30615", "trust": 1.2 }, { "db": "SECUNIA", "id": "31568", "trust": 1.2 }, { "db": "SECUNIA", "id": "31351", "trust": 1.2 }, { "db": "SECUNIA", "id": "30648", "trust": 1.2 }, { "db": "SECUNIA", "id": "31467", "trust": 1.2 }, { "db": "SECUNIA", "id": "30647", "trust": 1.2 }, { "db": "SECUNIA", "id": "30596", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2008-001431", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20081031 VMSA-2008-0017 UPDATED ESX PACKAGES FOR LIBXML2, UCD-SNMP, LIBTIFF", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080609 [OCERT-2008-006] MULTIPLE SNMP IMPLEMENTATIONS HMAC AUTHENTICATION SPOOFING", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2008:0529", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDVSA-2008:118", "trust": 0.6 }, { "db": "MILW0RM", "id": "5790", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2008-5218", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2008-5215", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2008-5224", "trust": 0.6 }, { "db": "SUNALERT", "id": "238865", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20080609 [OCERT-2008-006] MULTIPLE SNMP IMPLEMENTATIONS HMAC AUTHENTICATION SPOOFING", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA08-162A", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-685-1", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1663", "trust": 0.6 }, { "db": "CISCO", "id": "20080610 SNMP VERSION 3 AUTHENTICATION VULNERABILITIES", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200808-02", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200806-140", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "67532", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "68741", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "68866", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "72606", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "67160", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "67231", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "67140", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "71748", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-31085", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2008-0960", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "71406", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#878044" }, { "db": "VULHUB", "id": "VHN-31085" }, { "db": "VULMON", "id": "CVE-2008-0960" }, { "db": "BID", "id": "29623" }, { "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "db": "PACKETSTORM", "id": "71406" }, { "db": "PACKETSTORM", "id": "68866" }, { "db": "PACKETSTORM", "id": "68741" }, { "db": "PACKETSTORM", "id": "72606" }, { "db": "PACKETSTORM", "id": "67532" }, { "db": "CNNVD", "id": "CNNVD-200806-140" }, { "db": "NVD", "id": "CVE-2008-0960" } ] }, "id": "VAR-200806-0575", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-31085" } ], "trust": 0.61355825 }, "last_update_date": "2024-07-23T22:03:53.151000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Update 2008-004", "trust": 0.8, "url": "http://support.apple.com/kb/ht2163" }, { "title": "net-snmp-5.3.1-19.1.1AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=146" }, { "title": "cisco-sa-20080610-snmpv3", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "title": "1291", "trust": 0.8, "url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=1291" }, { "title": "1328", "trust": 0.8, "url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=1328" }, { "title": "NV08-007", "trust": 0.8, "url": "http://www.nec.co.jp/security-info/secinfo/nv08-007.html" }, { "title": "Fixes VU#878044 and CVE-2008-0960", "trust": 0.8, "url": "https://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "title": "RHSA-2008:0528", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2008-0528.html" }, { "title": "RHSA-2008:0529", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2008-0529.html" }, { "title": "Net-SNMP SNMPv3 USM \u8a8d\u8a3c\u51e6\u7406\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://www.seil.jp/seilseries/security/2008/06111446.php" }, { "title": "238865", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1" }, { "title": "snmp_12", "trust": 0.8, "url": "http://fenics.fujitsu.com/products/support/2008/snmp_12.html" }, { "title": "SNMPv3\u306b\u95a2\u3059\u308b\u8a8d\u8a3c\u56de\u907f\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.allied-telesis.co.jp/support/list/faq/vuls/20080924.html" }, { "title": "AX-VU2008-02", "trust": 0.8, "url": "http://www.alaxala.com/jp/support/security/20080630.html" }, { "title": "RHSA-2008:0528", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2008-0528j.html" }, { "title": "RHSA-2008:0529", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2008-0529j.html" }, { "title": "YSAR-15-0002: Vnet/IP\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u30a4\u30c3\u30c1\u306bSNMPv3\u8a8d\u8a3c\u8fc2\u56de\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm" }, { "title": "SNMPv3", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/network/notice/snmpv3.html" }, { "title": "TA08-162A", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-162a.html" }, { "title": "Debian CVElist Bug Report Logs: net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a8541a6f686f7cf0c507fc152f31fed3" }, { "title": "Cisco: SNMP Version 3 Authentication Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20080610-snmpv3" }, { "title": "Ubuntu Security Notice: net-snmp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-685-1" }, { "title": "Debian Security Advisories: DSA-1663-1 net-snmp -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=61d231c8116737565b9155223d52d04c" }, { "title": "VMware Security Advisories: Updated ESX packages for libxml2, ucd-snmp, libtiff", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=4b3f89e87c3a2b8f6ca491f31d73afa9" }, { "title": "VMware Security Advisories: Updated ESX packages for OpenSSL, net-snmp, perl", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=66428db28c8b0a38eb32535e5949367a" } ], "sources": [ { "db": "VULMON", "id": "CVE-2008-0960" }, { "db": "JVNDB", "id": "JVNDB-2008-001431" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31085" }, { "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "db": "NVD", "id": "CVE-2008-0960" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://www.kb.cert.org/vuls/id/878044" }, { "trust": 2.9, "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "trust": 2.6, "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "trust": 2.6, "url": "http://www.securityfocus.com/bid/29623" }, { "trust": 2.6, "url": "http://www.us-cert.gov/cas/techalerts/ta08-162a.html" }, { "trust": 2.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "trust": 2.1, "url": "http://support.apple.com/kb/ht2163" }, { "trust": 2.1, "url": "http://support.avaya.com/elmodocs2/security/asa-2008-282.htm" }, { "trust": 2.1, "url": "http://www.kb.cert.org/vuls/id/mimg-7ets5z" }, { "trust": 2.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "trust": 1.9, "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "trust": 1.8, "url": "http://www.kb.cert.org/vuls/id/ctar-7fbs8q" }, { "trust": 1.8, "url": "http://www.kb.cert.org/vuls/id/mimg-7ets87" }, { "trust": 1.8, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0013.html" }, { "trust": 1.8, "url": "http://www.debian.org/security/2008/dsa-1663" }, { "trust": 1.8, "url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00363.html" }, { "trust": 1.8, "url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00459.html" }, { "trust": 1.8, "url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00380.html" }, { "trust": 1.8, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:118" }, { "trust": 1.8, "url": "http://www.vmware.com/security/advisories/vmsa-2008-0017.html" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2008-0529.html" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id?1020218" }, { "trust": 1.8, "url": "http://secunia.com/advisories/32664" }, { "trust": 1.8, "url": "http://secunia.com/advisories/33003" }, { "trust": 1.8, "url": "http://secunia.com/advisories/35463" }, { "trust": 1.8, "url": "http://securityreason.com/securityalert/3933" }, { "trust": 1.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "trust": 1.8, "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "trust": 1.7, "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "trust": 1.6, "url": "http://secunia.com/advisories/30574/" }, { "trust": 1.5, "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "trust": 1.5, "url": "http://rhn.redhat.com/errata/rhsa-2008-0528.html" }, { "trust": 1.2, "url": "http://lists.apple.com/archives/security-announce/2008//jun/msg00002.html" }, { "trust": 1.2, "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "trust": 1.2, "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "trust": 1.2, "url": "https://www.exploit-db.com/exploits/5790" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10820" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5785" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6414" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30574" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30596" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30612" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30615" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30626" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30647" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30648" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30665" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30802" }, { "trust": 1.2, "url": "http://secunia.com/advisories/31334" }, { "trust": 1.2, "url": "http://secunia.com/advisories/31351" }, { "trust": 1.2, "url": "http://secunia.com/advisories/31467" }, { "trust": 1.2, "url": "http://secunia.com/advisories/31568" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "trust": 1.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0960" }, { "trust": 0.8, "url": "http://secunia.com/advisories/30665/" }, { "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1 " }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu878044/" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta08-162a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta08-162a/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0960" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/497962/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/493218/100/0/threaded" }, { "trust": 0.6, "url": "http://www.milw0rm.com/exploits/5790" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/2971" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/2361" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1981/references" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1836/references" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1801/references" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1800/references" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1797/references" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1788/references" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1787/references" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0960" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-2292" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a00809adfc8.html" }, { "trust": 0.3, "url": "http://www.net-snmp.org/" }, { "trust": 0.3, "url": "http://www.ingate.com/relnote.php?ver=471" }, { "trust": 0.3, "url": "/archive/1/493218" }, { "trust": 0.3, "url": "/archive/1/493238" }, { "trust": 0.3, "url": "/archive/1/493304" }, { "trust": 0.3, "url": "/archive/1/495389" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2008-252.htm" }, { "trust": 0.3, "url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026id=766427" }, { "trust": 0.3, "url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026documentoid=905600\u0026poid=" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0529.html" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2292" }, { "trust": 0.1, "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026amp;aid=1989089\u0026amp;group_id=12694\u0026amp;atid=456380" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=127730470825399\u0026amp;w=2" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485945" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20080610-snmpv3" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/5790/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/685-1/" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx303-200810503-sg.zip" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-3281" }, { "trust": 0.1, "url": "http://vmware.com/support/esx25/doc/esx-255-200810-patch.html" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/esx/esx-2.5.4-119703-upgrade.tar.gz" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1006968" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1006971" }, { "trust": 0.1, "url": "http://www.vmware.com/security" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx-1006968.tgz" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-2327" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2327" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://vmware.com/support/esx25/doc/esx-254-200810-patch.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3281" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/esx/esx-2.5.5-119702-upgrade.tar.gz" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/perl-snmp-5.4.1-19.2.i586.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/net-snmp-5.4.1-77.2.src.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libsnmp15-5.4.1-19.2.i586.rpm" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-devel-5.4.1-19.2.i586.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libsnmp15-5.4.1-77.2.i586.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/net-snmp-32bit-5.4.1-77.2.x86_64.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/perl-snmp-5.4.1-77.2.i586.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/net-snmp-5.4.1-19.2.src.rpm" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://download.novell.com/index.jsp?search=search\u0026keywords=71093bdfd49361f6dbe32a8fde43b848" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-5.4.1-77.2.i586.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/net-snmp-32bit-5.4.1-19.2.x86_64.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/snmp-mibs-5.4.1-77.2.i586.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/snmp-mibs-5.4.1-19.2.i586.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-5.4.1-19.2.i586.rpm" }, { "trust": 0.1, "url": "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-devel-5.4.1-77.2.i586.rpm" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4309" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" } ], "sources": [ { "db": "CERT/CC", "id": "VU#878044" }, { "db": "VULHUB", "id": "VHN-31085" }, { "db": "VULMON", "id": "CVE-2008-0960" }, { "db": "BID", "id": "29623" }, { "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "db": "PACKETSTORM", "id": "71406" }, { "db": "PACKETSTORM", "id": "68866" }, { "db": "PACKETSTORM", "id": "68741" }, { "db": "PACKETSTORM", "id": "72606" }, { "db": "PACKETSTORM", "id": "67532" }, { "db": "CNNVD", "id": "CNNVD-200806-140" }, { "db": "NVD", "id": "CVE-2008-0960" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#878044" }, { "db": "VULHUB", "id": "VHN-31085" }, { "db": "VULMON", "id": "CVE-2008-0960" }, { "db": "BID", "id": "29623" }, { "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "db": "PACKETSTORM", "id": "71406" }, { "db": "PACKETSTORM", "id": "68866" }, { "db": "PACKETSTORM", "id": "68741" }, { "db": "PACKETSTORM", "id": "72606" }, { "db": "PACKETSTORM", "id": "67532" }, { "db": "CNNVD", "id": "CNNVD-200806-140" }, { "db": "NVD", "id": "CVE-2008-0960" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-06-10T00:00:00", "db": "CERT/CC", "id": "VU#878044" }, { "date": "2008-06-10T00:00:00", "db": "VULHUB", "id": "VHN-31085" }, { "date": "2008-06-10T00:00:00", "db": "VULMON", "id": "CVE-2008-0960" }, { "date": "2008-06-10T00:00:00", "db": "BID", "id": "29623" }, { "date": "2008-07-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "date": "2008-10-31T18:41:56", "db": "PACKETSTORM", "id": "71406" }, { "date": "2008-08-06T21:36:36", "db": "PACKETSTORM", "id": "68866" }, { "date": "2008-08-01T20:22:12", "db": "PACKETSTORM", "id": "68741" }, { "date": "2008-12-04T02:50:13", "db": "PACKETSTORM", "id": "72606" }, { "date": "2008-06-21T01:10:58", "db": "PACKETSTORM", "id": "67532" }, { "date": "2008-06-10T00:00:00", "db": "CNNVD", "id": "CNNVD-200806-140" }, { "date": "2008-06-10T18:32:00", "db": "NVD", "id": "CVE-2008-0960" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-07-16T00:00:00", "db": "CERT/CC", "id": "VU#878044" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-31085" }, { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2008-0960" }, { "date": "2015-04-13T22:21:00", "db": "BID", "id": "29623" }, { "date": "2016-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001431" }, { "date": "2011-07-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200806-140" }, { "date": "2018-10-30T16:25:36.577000", "db": "NVD", "id": "CVE-2008-0960" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "72606" }, { "db": "CNNVD", "id": "CNNVD-200806-140" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SNMPv3 improper HMAC validation allows authentication bypass", "sources": [ { "db": "CERT/CC", "id": "VU#878044" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-200806-140" } ], "trust": 0.6 } }
gsd-2008-0960
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2008-0960", "description": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.", "id": "GSD-2008-0960", "references": [ "https://www.suse.com/security/cve/CVE-2008-0960.html", "https://www.debian.org/security/2008/dsa-1663", "https://access.redhat.com/errata/RHSA-2008:0529", "https://access.redhat.com/errata/RHSA-2008:0528", "https://linux.oracle.com/cve/CVE-2008-0960.html", "https://packetstormsecurity.com/files/cve/CVE-2008-0960" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-0960" ], "details": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.", "id": "GSD-2008-0960", "modified": "2023-12-13T01:22:58.339505Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2008-0960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380", "refsource": "CONFIRM", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30615" }, { "name": "http://support.apple.com/kb/HT2163", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30648" }, { "name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "refsource": "MLIST", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "name": "http://www.ocert.org/advisories/ocert-2008-006.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30802" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=833770", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30574" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2008-0960" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "http://www.ocert.org/advisories/ocert-2008-006.html", "refsource": "MISC", "tags": [], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=833770", "refsource": "CONFIRM", "tags": [], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380", "refsource": "CONFIRM", "tags": [], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q", "refsource": "CONFIRM", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z", "refsource": "CONFIRM", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87", "refsource": "CONFIRM", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "name": "RHSA-2008:0528", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "VU#878044", "refsource": "CERT-VN", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "29623", "refsource": "BID", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "30574", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30574" }, { "name": "30596", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30596" }, { "name": "TA08-162A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "name": "31334", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31334" }, { "name": "238865", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "FEDORA-2008-5218", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "30647", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30647" }, { "name": "http://support.apple.com/kb/HT2163", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT2163" }, { "name": "APPLE-SA-2008-06-30", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "30648", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30648" }, { "name": "31467", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31467" }, { "name": "MDVSA-2008:118", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "FEDORA-2008-5215", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "name": "30802", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30802" }, { "name": "30665", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30665" }, { "name": "31351", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31351" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "refsource": "MLIST", "tags": [], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "refsource": "CISCO", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "FEDORA-2008-5224", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "SUSE-SA:2008:039", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "30626", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30626" }, { "name": "GLSA-200808-02", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "31568", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31568" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html", "refsource": "MISC", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "DSA-1663", "refsource": "DEBIAN", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "RHSA-2008:0529", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30615", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30615" }, { "name": "1020218", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30612", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30612" }, { "name": "32664", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32664" }, { "name": "3933", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/3933" }, { "name": "33003", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33003" }, { "name": "USN-685-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "ADV-2009-1612", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "35463", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35463" }, { "name": "SSRT080082", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "ADV-2008-2361", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "ADV-2008-2971", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "ADV-2008-1836", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "ADV-2008-1800", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "ADV-2008-1981", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1797", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "ADV-2008-1801", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "ADV-2008-1788", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "name": "ADV-2008-1787", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "5790", "refsource": "EXPLOIT-DB", "tags": [], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "oval:org.mitre.oval:def:6414", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "oval:org.mitre.oval:def:5785", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "oval:org.mitre.oval:def:10820", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:25Z", "publishedDate": "2008-06-10T18:32Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.