Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-1447 (GCVE-0-2008-1447)
Vulnerability from cvelistv5 – Published: 2008-07-08 23:00 – Updated: 2024-08-07 08:24- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:24:42.012Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1020438",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020438"
},
{
"name": "FEDORA-2008-6256",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
},
{
"name": "SUSE-SR:2008:017",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"name": "VU#800113",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"name": "31137",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31137"
},
{
"name": "31430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31430"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
},
{
"name": "31169",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31169"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"name": "1020702",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020702"
},
{
"name": "GLSA-201209-25",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name": "ADV-2008-2052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"name": "1020561",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020561"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"name": "HPSBOV03226",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "1020578",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020578"
},
{
"name": "FreeBSD-SA-08:06",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD",
"x_transferred"
],
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"name": "oval:org.mitre.oval:def:9627",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
},
{
"name": "1020802",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020802"
},
{
"name": "HPSBMP02404",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "30131",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30131"
},
{
"name": "[4.2] 013: SECURITY FIX: July 23, 2008",
"tags": [
"vendor-advisory",
"x_refsource_OPENBSD",
"x_transferred"
],
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"name": "31236",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31236"
},
{
"name": "APPLE-SA-2008-09-15",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"name": "1020651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020651"
},
{
"name": "1020437",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020437"
},
{
"name": "31209",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31209"
},
{
"name": "31012",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31012"
},
{
"name": "31151",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31151"
},
{
"name": "ADV-2008-2050",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.citrix.com/article/CTX117991"
},
{
"name": "SSRT101004",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "31237",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31237"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
},
{
"name": "APPLE-SA-2008-07-31",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"name": "win-dns-client-server-spoofing(43334)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"name": "31495",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31495"
},
{
"name": "6130",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"name": "20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
},
{
"name": "1020579",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020579"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"name": "1020653",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020653"
},
{
"name": "30998",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30998"
},
{
"name": "DSA-1603",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"name": "ADV-2008-2525",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"name": "SUSE-SA:2008:033",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"name": "31094",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31094"
},
{
"name": "IZ26668",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"name": "31687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31687"
},
{
"name": "ADV-2008-2025",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"name": "239392",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"name": "TA08-260A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"name": "31588",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31588"
},
{
"name": "31019",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31019"
},
{
"name": "ADV-2008-2029",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"name": "SSRT080058",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "6123",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"name": "IZ26671",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"name": "FEDORA-2008-6281",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
},
{
"name": "ADV-2008-2268",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"name": "ADV-2009-0297",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"name": "HPSBUX02351",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "31207",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31207"
},
{
"name": "31031",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31031"
},
{
"name": "ADV-2008-2584",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"name": "31451",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31451"
},
{
"name": "ADV-2008-2051",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"name": "30977",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30977"
},
{
"name": "RHSA-2008:0789",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
},
{
"name": "ADV-2008-2377",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"name": "HPSBNS02405",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"name": "1020558",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020558"
},
{
"name": "31221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31221"
},
{
"name": "RHSA-2008:0533",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"name": "[4.3] 004: SECURITY FIX: July 23, 2008",
"tags": [
"vendor-advisory",
"x_refsource_OPENBSD",
"x_transferred"
],
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"name": "1020804",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020804"
},
{
"name": "31143",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31143"
},
{
"name": "20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"name": "ADV-2008-2195",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"name": "ADV-2008-2196",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"name": "33714",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33714"
},
{
"name": "HPSBTU02358",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"name": "33786",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33786"
},
{
"name": "1020448",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020448"
},
{
"name": "31882",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31882"
},
{
"name": "ADV-2008-2384",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"name": "IZ26669",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"name": "ADV-2008-2123",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3026"
},
{
"name": "31014",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31014"
},
{
"name": "30979",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30979"
},
{
"name": "1020575",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020575"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "ADV-2008-2482",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"name": "IZ26672",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3129"
},
{
"name": "DSA-1619",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"name": "ADV-2008-2166",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"name": "31072",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31072"
},
{
"name": "ADV-2008-2139",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"name": "oval:org.mitre.oval:def:5761",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
},
{
"name": "ADV-2008-2092",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"name": "31482",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31482"
},
{
"name": "IZ26670",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"name": "MDVSA-2008:139",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
},
{
"name": "oval:org.mitre.oval:def:5917",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
},
{
"name": "30989",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30989"
},
{
"name": "ADV-2008-2055",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"name": "SSRT071449",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40"
},
{
"name": "31065",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31065"
},
{
"name": "31254",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31254"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.doxpara.com/?p=1176"
},
{
"name": "NetBSD-SA2008-009",
"tags": [
"vendor-advisory",
"x_refsource_NETBSD",
"x_transferred"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
},
{
"name": "USN-627-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"name": "ADV-2010-0622",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name": "1020576",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020576"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"name": "HPSBOV02357",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
},
{
"name": "31153",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31153"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
},
{
"name": "ADV-2008-2549",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"name": "IZ26667",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"name": "31213",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31213"
},
{
"name": "31030",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31030"
},
{
"name": "USN-622-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"name": "31033",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31033"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"name": "1020440",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020440"
},
{
"name": "APPLE-SA-2008-09-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.doxpara.com/DMK_BO2K8.ppt"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"name": "DSA-1604",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"name": "31823",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31823"
},
{
"name": "31326",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31326"
},
{
"name": "ADV-2008-2558",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"name": "6122",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"name": "oval:org.mitre.oval:def:5725",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
},
{
"name": "cisco-multiple-dns-cache-poisoning(43637)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"name": "ADV-2008-2383",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"name": "1020560",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020560"
},
{
"name": "31900",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31900"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.citrix.com/article/CTX118183"
},
{
"name": "30925",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30925"
},
{
"name": "ADV-2009-0311",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
},
{
"name": "DSA-1623",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"name": "ADV-2008-2582",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
},
{
"name": "DSA-1605",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"name": "ADV-2008-2342",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"name": "ADV-2008-2114",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"name": "30973",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30973"
},
{
"name": "31204",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31204"
},
{
"name": "31354",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31354"
},
{
"name": "GLSA-200812-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "oval:org.mitre.oval:def:12117",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
},
{
"name": "33178",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33178"
},
{
"name": "30988",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30988"
},
{
"name": "APPLE-SA-2008-09-09",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"name": "31011",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31011"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"name": "ADV-2008-2334",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "1020577",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020577"
},
{
"name": "31422",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31422"
},
{
"name": "31197",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31197"
},
{
"name": "1020548",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020548"
},
{
"name": "ADV-2008-2467",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"name": "240048",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"name": "TA08-190B",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
},
{
"name": "TA08-190A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
},
{
"name": "GLSA-200807-08",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"name": "31022",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31022"
},
{
"name": "SSA:2008-191",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"name": "1020449",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020449"
},
{
"name": "31093",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31093"
},
{
"name": "31052",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31052"
},
{
"name": "30980",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30980"
},
{
"name": "SSA:2008-205-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "31199",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31199"
},
{
"name": "ADV-2008-2030",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"name": "ADV-2008-2291",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"name": "ADV-2008-2023",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"name": "SSRT090014",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "ADV-2008-2466",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"name": "MS08-037",
"tags": [
"vendor-advisory",
"x_refsource_MS",
"x_transferred"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"name": "31212",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31212"
},
{
"name": "ADV-2008-2113",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"name": "31152",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31152"
},
{
"name": "ADV-2008-2019",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"name": "ADV-2008-2197",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-07-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-12T19:57:01.000Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "1020438",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020438"
},
{
"name": "FEDORA-2008-6256",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
},
{
"name": "SUSE-SR:2008:017",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"name": "VU#800113",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"name": "31137",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31137"
},
{
"name": "31430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31430"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
},
{
"name": "31169",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31169"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"name": "1020702",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020702"
},
{
"name": "GLSA-201209-25",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name": "ADV-2008-2052",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"name": "1020561",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020561"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"name": "HPSBOV03226",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "1020578",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020578"
},
{
"name": "FreeBSD-SA-08:06",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD"
],
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"name": "oval:org.mitre.oval:def:9627",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
},
{
"name": "1020802",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020802"
},
{
"name": "HPSBMP02404",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "30131",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30131"
},
{
"name": "[4.2] 013: SECURITY FIX: July 23, 2008",
"tags": [
"vendor-advisory",
"x_refsource_OPENBSD"
],
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"name": "31236",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31236"
},
{
"name": "APPLE-SA-2008-09-15",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"name": "1020651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020651"
},
{
"name": "1020437",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020437"
},
{
"name": "31209",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31209"
},
{
"name": "31012",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31012"
},
{
"name": "31151",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31151"
},
{
"name": "ADV-2008-2050",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.citrix.com/article/CTX117991"
},
{
"name": "SSRT101004",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "31237",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31237"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
},
{
"name": "APPLE-SA-2008-07-31",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"name": "win-dns-client-server-spoofing(43334)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"name": "31495",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31495"
},
{
"name": "6130",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"name": "20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
},
{
"name": "1020579",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020579"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"name": "1020653",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020653"
},
{
"name": "30998",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30998"
},
{
"name": "DSA-1603",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"name": "ADV-2008-2525",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"name": "SUSE-SA:2008:033",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"name": "31094",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31094"
},
{
"name": "IZ26668",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"name": "31687",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31687"
},
{
"name": "ADV-2008-2025",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"name": "239392",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"name": "TA08-260A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"name": "31588",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31588"
},
{
"name": "31019",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31019"
},
{
"name": "ADV-2008-2029",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"name": "SSRT080058",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "6123",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"name": "IZ26671",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"name": "FEDORA-2008-6281",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
},
{
"name": "ADV-2008-2268",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"name": "ADV-2009-0297",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"name": "HPSBUX02351",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "31207",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31207"
},
{
"name": "31031",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31031"
},
{
"name": "ADV-2008-2584",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"name": "31451",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31451"
},
{
"name": "ADV-2008-2051",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"name": "30977",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30977"
},
{
"name": "RHSA-2008:0789",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
},
{
"name": "ADV-2008-2377",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"name": "HPSBNS02405",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"name": "1020558",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020558"
},
{
"name": "31221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31221"
},
{
"name": "RHSA-2008:0533",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"name": "[4.3] 004: SECURITY FIX: July 23, 2008",
"tags": [
"vendor-advisory",
"x_refsource_OPENBSD"
],
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"name": "1020804",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020804"
},
{
"name": "31143",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31143"
},
{
"name": "20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"name": "ADV-2008-2195",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"name": "ADV-2008-2196",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"name": "33714",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33714"
},
{
"name": "HPSBTU02358",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"name": "33786",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33786"
},
{
"name": "1020448",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020448"
},
{
"name": "31882",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31882"
},
{
"name": "ADV-2008-2384",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"name": "IZ26669",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"name": "ADV-2008-2123",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3026"
},
{
"name": "31014",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31014"
},
{
"name": "30979",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30979"
},
{
"name": "1020575",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020575"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "ADV-2008-2482",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"name": "IZ26672",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3129"
},
{
"name": "DSA-1619",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"name": "ADV-2008-2166",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"name": "31072",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31072"
},
{
"name": "ADV-2008-2139",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"name": "oval:org.mitre.oval:def:5761",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
},
{
"name": "ADV-2008-2092",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"name": "31482",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31482"
},
{
"name": "IZ26670",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"name": "MDVSA-2008:139",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
},
{
"name": "oval:org.mitre.oval:def:5917",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
},
{
"name": "30989",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30989"
},
{
"name": "ADV-2008-2055",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"name": "SSRT071449",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40"
},
{
"name": "31065",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31065"
},
{
"name": "31254",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31254"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.doxpara.com/?p=1176"
},
{
"name": "NetBSD-SA2008-009",
"tags": [
"vendor-advisory",
"x_refsource_NETBSD"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
},
{
"name": "USN-627-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"name": "ADV-2010-0622",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name": "1020576",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020576"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"name": "HPSBOV02357",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
},
{
"name": "31153",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31153"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
},
{
"name": "ADV-2008-2549",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"name": "IZ26667",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"name": "31213",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31213"
},
{
"name": "31030",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31030"
},
{
"name": "USN-622-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"name": "31033",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31033"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"name": "1020440",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020440"
},
{
"name": "APPLE-SA-2008-09-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.doxpara.com/DMK_BO2K8.ppt"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"name": "DSA-1604",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"name": "31823",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31823"
},
{
"name": "31326",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31326"
},
{
"name": "ADV-2008-2558",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"name": "6122",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"name": "oval:org.mitre.oval:def:5725",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
},
{
"name": "cisco-multiple-dns-cache-poisoning(43637)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"name": "ADV-2008-2383",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"name": "1020560",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020560"
},
{
"name": "31900",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31900"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.citrix.com/article/CTX118183"
},
{
"name": "30925",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30925"
},
{
"name": "ADV-2009-0311",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
},
{
"name": "DSA-1623",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"name": "ADV-2008-2582",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
},
{
"name": "DSA-1605",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"name": "ADV-2008-2342",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"name": "ADV-2008-2114",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"name": "30973",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30973"
},
{
"name": "31204",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31204"
},
{
"name": "31354",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31354"
},
{
"name": "GLSA-200812-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "oval:org.mitre.oval:def:12117",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
},
{
"name": "33178",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33178"
},
{
"name": "30988",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30988"
},
{
"name": "APPLE-SA-2008-09-09",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"name": "31011",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31011"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"name": "ADV-2008-2334",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "1020577",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020577"
},
{
"name": "31422",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31422"
},
{
"name": "31197",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31197"
},
{
"name": "1020548",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020548"
},
{
"name": "ADV-2008-2467",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"name": "240048",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"name": "TA08-190B",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
},
{
"name": "TA08-190A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
},
{
"name": "GLSA-200807-08",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"name": "31022",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31022"
},
{
"name": "SSA:2008-191",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"name": "1020449",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020449"
},
{
"name": "31093",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31093"
},
{
"name": "31052",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31052"
},
{
"name": "30980",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30980"
},
{
"name": "SSA:2008-205-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "31199",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31199"
},
{
"name": "ADV-2008-2030",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"name": "ADV-2008-2291",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"name": "ADV-2008-2023",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"name": "SSRT090014",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "ADV-2008-2466",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"name": "MS08-037",
"tags": [
"vendor-advisory",
"x_refsource_MS"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"name": "31212",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31212"
},
{
"name": "ADV-2008-2113",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"name": "31152",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31152"
},
{
"name": "ADV-2008-2019",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"name": "ADV-2008-2197",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-1447",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1020438",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020438"
},
{
"name": "FEDORA-2008-6256",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
},
{
"name": "SUSE-SR:2008:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"name": "VU#800113",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"name": "31137",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31137"
},
{
"name": "31430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31430"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
},
{
"name": "31169",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31169"
},
{
"name": "http://www.phys.uu.nl/~rombouts/pdnsd.html",
"refsource": "CONFIRM",
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"name": "1020702",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020702"
},
{
"name": "GLSA-201209-25",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name": "ADV-2008-2052",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"name": "1020561",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020561"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"name": "HPSBOV03226",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "1020578",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020578"
},
{
"name": "FreeBSD-SA-08:06",
"refsource": "FREEBSD",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"name": "oval:org.mitre.oval:def:9627",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
},
{
"name": "1020802",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020802"
},
{
"name": "HPSBMP02404",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "30131",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30131"
},
{
"name": "[4.2] 013: SECURITY FIX: July 23, 2008",
"refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"name": "31236",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31236"
},
{
"name": "APPLE-SA-2008-09-15",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"name": "1020651",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020651"
},
{
"name": "1020437",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020437"
},
{
"name": "31209",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31209"
},
{
"name": "31012",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31012"
},
{
"name": "31151",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31151"
},
{
"name": "ADV-2008-2050",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"name": "http://support.citrix.com/article/CTX117991",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX117991"
},
{
"name": "SSRT101004",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "31237",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31237"
},
{
"name": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog",
"refsource": "CONFIRM",
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
},
{
"name": "APPLE-SA-2008-07-31",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"name": "win-dns-client-server-spoofing(43334)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"name": "31495",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31495"
},
{
"name": "6130",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"name": "20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
},
{
"name": "1020579",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020579"
},
{
"name": "http://www.nominum.com/asset_upload_file741_2661.pdf",
"refsource": "MISC",
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"name": "1020653",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020653"
},
{
"name": "30998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30998"
},
{
"name": "DSA-1603",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"name": "ADV-2008-2525",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"name": "SUSE-SA:2008:033",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"name": "31094",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31094"
},
{
"name": "IZ26668",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"name": "31687",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31687"
},
{
"name": "ADV-2008-2025",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"name": "239392",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"name": "TA08-260A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"name": "31588",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31588"
},
{
"name": "31019",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31019"
},
{
"name": "ADV-2008-2029",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"name": "SSRT080058",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "6123",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"name": "IZ26671",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"name": "FEDORA-2008-6281",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
},
{
"name": "ADV-2008-2268",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"name": "ADV-2009-0297",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"name": "HPSBUX02351",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "31207",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31207"
},
{
"name": "31031",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31031"
},
{
"name": "ADV-2008-2584",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"name": "31451",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31451"
},
{
"name": "ADV-2008-2051",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"name": "30977",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30977"
},
{
"name": "RHSA-2008:0789",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
},
{
"name": "ADV-2008-2377",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"name": "HPSBNS02405",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"name": "1020558",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020558"
},
{
"name": "31221",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31221"
},
{
"name": "RHSA-2008:0533",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"name": "[4.3] 004: SECURITY FIX: July 23, 2008",
"refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"name": "1020804",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020804"
},
{
"name": "31143",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31143"
},
{
"name": "20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"name": "ADV-2008-2195",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"name": "ADV-2008-2196",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"name": "33714",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33714"
},
{
"name": "HPSBTU02358",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"name": "33786",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33786"
},
{
"name": "1020448",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020448"
},
{
"name": "31882",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31882"
},
{
"name": "ADV-2008-2384",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"name": "IZ26669",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"name": "http://up2date.astaro.com/2008/08/up2date_7202_released.html",
"refsource": "CONFIRM",
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"name": "ADV-2008-2123",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"name": "http://support.apple.com/kb/HT3026",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3026"
},
{
"name": "31014",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31014"
},
{
"name": "30979",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30979"
},
{
"name": "1020575",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020575"
},
{
"name": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
"refsource": "CONFIRM",
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "ADV-2008-2482",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"name": "IZ26672",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"name": "http://support.apple.com/kb/HT3129",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3129"
},
{
"name": "DSA-1619",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"name": "ADV-2008-2166",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"name": "31072",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31072"
},
{
"name": "ADV-2008-2139",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"name": "oval:org.mitre.oval:def:5761",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
},
{
"name": "ADV-2008-2092",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"name": "31482",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31482"
},
{
"name": "IZ26670",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"name": "MDVSA-2008:139",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
},
{
"name": "oval:org.mitre.oval:def:5917",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
},
{
"name": "30989",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30989"
},
{
"name": "ADV-2008-2055",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"name": "SSRT071449",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152",
"refsource": "CONFIRM",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152"
},
{
"name": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40",
"refsource": "CONFIRM",
"url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40"
},
{
"name": "31065",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31065"
},
{
"name": "31254",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31254"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"name": "http://www.doxpara.com/?p=1176",
"refsource": "MISC",
"url": "http://www.doxpara.com/?p=1176"
},
{
"name": "NetBSD-SA2008-009",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
},
{
"name": "USN-627-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"name": "ADV-2010-0622",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name": "1020576",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020576"
},
{
"name": "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
"refsource": "CONFIRM",
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"name": "HPSBOV02357",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
},
{
"name": "31153",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31153"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
},
{
"name": "ADV-2008-2549",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"name": "IZ26667",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html",
"refsource": "CONFIRM",
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"name": "31213",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31213"
},
{
"name": "31030",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31030"
},
{
"name": "USN-622-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"name": "31033",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31033"
},
{
"name": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html",
"refsource": "MISC",
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"name": "1020440",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020440"
},
{
"name": "APPLE-SA-2008-09-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"name": "http://www.doxpara.com/DMK_BO2K8.ppt",
"refsource": "MISC",
"url": "http://www.doxpara.com/DMK_BO2K8.ppt"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"name": "DSA-1604",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"name": "31823",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31823"
},
{
"name": "31326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31326"
},
{
"name": "ADV-2008-2558",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"name": "6122",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"name": "oval:org.mitre.oval:def:5725",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
},
{
"name": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt",
"refsource": "MISC",
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
},
{
"name": "cisco-multiple-dns-cache-poisoning(43637)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"name": "ADV-2008-2383",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"name": "1020560",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020560"
},
{
"name": "31900",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31900"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
},
{
"name": "http://support.citrix.com/article/CTX118183",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX118183"
},
{
"name": "30925",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30925"
},
{
"name": "ADV-2009-0311",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
},
{
"name": "DSA-1623",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"name": "ADV-2008-2582",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"name": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt",
"refsource": "MISC",
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
},
{
"name": "DSA-1605",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7000912",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
},
{
"name": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning",
"refsource": "CONFIRM",
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"name": "ADV-2008-2342",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"name": "ADV-2008-2114",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"name": "30973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30973"
},
{
"name": "31204",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31204"
},
{
"name": "31354",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31354"
},
{
"name": "GLSA-200812-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "oval:org.mitre.oval:def:12117",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
},
{
"name": "33178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33178"
},
{
"name": "30988",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30988"
},
{
"name": "APPLE-SA-2008-09-09",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"name": "31011",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31011"
},
{
"name": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html",
"refsource": "MISC",
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"name": "ADV-2008-2334",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "1020577",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020577"
},
{
"name": "31422",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31422"
},
{
"name": "31197",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31197"
},
{
"name": "1020548",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020548"
},
{
"name": "ADV-2008-2467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"name": "240048",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"name": "TA08-190B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
},
{
"name": "TA08-190A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
},
{
"name": "GLSA-200807-08",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"name": "31022",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31022"
},
{
"name": "SSA:2008-191",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"name": "1020449",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020449"
},
{
"name": "31093",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31093"
},
{
"name": "31052",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31052"
},
{
"name": "30980",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30980"
},
{
"name": "SSA:2008-205-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "31199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31199"
},
{
"name": "ADV-2008-2030",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"name": "ADV-2008-2291",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"name": "ADV-2008-2023",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"name": "SSRT090014",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "ADV-2008-2466",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"name": "MS08-037",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"name": "31212",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31212"
},
{
"name": "ADV-2008-2113",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"name": "31152",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31152"
},
{
"name": "ADV-2008-2019",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"name": "ADV-2008-2197",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2008-1447",
"datePublished": "2008-07-08T23:00:00.000Z",
"dateReserved": "2008-03-21T00:00:00.000Z",
"dateUpdated": "2024-08-07T08:24:42.012Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-1447",
"date": "2026-05-17",
"epss": "0.86697",
"percentile": "0.99434"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EBDAFF8-DE44-4E80-B6BD-E341F767F501\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"823BF8BE-2309-4F67-A5E2-EAD98F723468\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F86F790-6247-42F2-9487-3D60A2842F52\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*\", \"matchCriteriaId\": \"83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*\", \"matchCriteriaId\": \"E3C43D05-40F8-4769-BA6B-A376420EA972\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*\", \"matchCriteriaId\": \"69117328-A5AD-48A5-A56A-0AA8805A113E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*\", \"matchCriteriaId\": \"3ECE18F6-9DDD-4354-9012-B0660E184E83\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*\", \"matchCriteriaId\": \"4A2B4F1C-737D-40DA-B12E-6C664F9A7ECA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*\", \"matchCriteriaId\": \"DBBCB4B2-8007-4AD5-946E-396330E7DC31\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*\", \"matchCriteriaId\": \"68758D17-44AF-4472-928C-3B94A7EAD671\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*\", \"matchCriteriaId\": \"76EDD7D7-4567-4007-86A3-95E907616C6A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*\", \"matchCriteriaId\": \"7A933555-D875-47B9-BFA7-E030B04C1197\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*\", \"matchCriteriaId\": \"4BAA5F63-9A88-4B38-B284-B6E6170F12A8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*\", \"matchCriteriaId\": \"9F168D81-2D2B-4B75-B907-A8AE2A3523C5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*\", \"matchCriteriaId\": \"1778D813-845D-4B79-B9AF-5D4E0B461C75\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*\", \"matchCriteriaId\": \"A2E917A1-AFE1-4AA3-AB80-A69F152BAB51\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*\", \"matchCriteriaId\": \"C8203007-1723-431B-ADDE-C5FE76A88619\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*\", \"matchCriteriaId\": \"423102CB-1FA1-46BB-8345-412F35DB25B7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*\", \"matchCriteriaId\": \"98E956AB-6A8E-4C5D-89D5-52BC374B1D7C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*\", \"matchCriteriaId\": \"676A5A3B-EFE5-4B84-8F8E-CF952003F48F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B339C33-8896-4896-88FF-88E74FDBC543\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*\", \"matchCriteriaId\": \"4902A7BD-0645-4CAC-8EA8-24BD2D8B893A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*\", \"matchCriteriaId\": \"492EA1BE-E678-4300-A690-3BFCD4B233B2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*\", \"matchCriteriaId\": \"4E3C9031-F69A-4B6A-A8CB-39027174AA01\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*\", \"matchCriteriaId\": \"D6B5646C-FF04-4D3D-B39E-27C1056962EA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*\", \"matchCriteriaId\": \"7361D8F0-FE84-41D0-9C62-F180339DD40A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*\", \"matchCriteriaId\": \"5454336D-724E-4027-A642-1EFCB79C1ADC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3C0D00-DF20-4B46-8A7D-99D963BD921E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90E4653A-C63A-4568-BFF2-ECAB7AB5A55C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \\\"DNS Insufficient Socket Entropy Vulnerability\\\" or \\\"the Kaminsky bug.\\\"\"}, {\"lang\": \"es\", \"value\": \"El protocolo DNS, como es implementado en (1) BIND 8 y 9 en versiones anteriores a 9.5.0-P1, 9.4.2-P1 y 9.3.5-P1; (2) Microsoft DNS en Windows 2000 SP4, XP SP2 y SP3 y Server 2003 SP1 y SP2; y otras implementaciones permiten a atacantes remotos suplantar el tr\\u00e1fico DNS a trav\\u00e9s de un ataque de un cumplea\\u00f1os que usa referencias in-bailiwick para llevar a cabo un envenenamiento del cach\\u00e9 contra resolutores recursivos, relacionado con la insifuciente aleatoriedad de la ID de la transacci\\u00f3n DNS y los puertos de origen, vulnerabilidad tambi\\u00e9n conocida como \\\"DNS Insufficient Socket Entropy Vulnerability\\\" o \\\"the Kaminsky bug\\\".\"}]",
"id": "CVE-2008-1447",
"lastModified": "2024-11-21T00:44:32.723",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 4.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-07-08T23:41:00.000",
"references": "[{\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Technical Description\"]}, {\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2008-0533.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30925\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30973\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30977\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30979\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30980\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30988\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30989\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30998\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31011\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31012\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31014\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31019\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31022\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31030\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31031\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31033\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31052\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31065\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31072\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31093\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31094\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31137\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31143\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31151\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31152\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31153\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31169\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31197\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31199\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31204\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31207\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31209\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31212\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31213\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31221\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31236\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31237\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31254\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31326\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31354\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31422\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31430\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31451\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31482\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31495\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31588\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31687\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31823\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31882\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31900\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33178\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33714\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33786\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200807-08.xml\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200812-17.xml\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201209-25.xml\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT3026\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT3129\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.citrix.com/article/CTX117991\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.citrix.com/article/CTX118183\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://up2date.astaro.com/2008/08/up2date_7202_released.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1603\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1604\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1605\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1619\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1623\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.doxpara.com/?p=1176\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.doxpara.com/DMK_BO2K8.ppt\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.isc.org/index.pl?/sw/bind/bind-security.php\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/800113\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.nominum.com/asset_upload_file741_2661.pdf\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.novell.com/support/viewContent.do?externalId=7000912\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openbsd.org/errata42.html#013_bind\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openbsd.org/errata43.html#004_bind\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.phys.uu.nl/~rombouts/pdnsd.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0789.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/495289/100/0/threaded\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/495869/100/0/threaded\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/30131\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020437\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020438\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020440\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020448\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020449\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020548\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020558\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020560\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020561\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020575\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020576\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020577\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020578\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020579\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020651\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020653\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020702\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020802\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020804\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-622-1\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-627-1\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA08-190A.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA08-190B.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA08-260A.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2008-0014.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2019/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2023/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2025/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2029/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2030/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2050/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2051/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2052/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2055/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2092/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2113/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2114/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2123/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2139/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2166/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2195/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2196/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2197/references\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2268\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2291\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2334\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2342\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2377\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2383\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2384\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2466\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2467\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2482\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2525\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2549\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2558\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2582\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2584\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0297\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0311\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0622\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://www.exploit-db.com/exploits/6122\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/6123\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/6130\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Technical Description\"]}, {\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2008-0533.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30925\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30973\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30977\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30979\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30980\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30988\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30989\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/30998\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31011\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31012\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31014\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31019\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31022\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31030\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31031\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31033\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31052\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31065\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31072\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31093\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31094\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31137\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31143\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31151\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31152\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31153\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31169\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31197\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31199\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31204\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31207\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31209\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31212\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31213\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31221\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31236\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31237\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31254\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31326\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31354\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31422\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31430\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31451\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31482\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31495\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31588\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31687\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31823\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31882\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31900\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33178\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33714\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33786\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200807-08.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200812-17.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201209-25.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT3026\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT3129\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.citrix.com/article/CTX117991\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.citrix.com/article/CTX118183\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://up2date.astaro.com/2008/08/up2date_7202_released.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1603\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1604\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1605\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1619\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1623\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.doxpara.com/?p=1176\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.doxpara.com/DMK_BO2K8.ppt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.isc.org/index.pl?/sw/bind/bind-security.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/800113\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.nominum.com/asset_upload_file741_2661.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.novell.com/support/viewContent.do?externalId=7000912\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openbsd.org/errata42.html#013_bind\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openbsd.org/errata43.html#004_bind\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.phys.uu.nl/~rombouts/pdnsd.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0789.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/495289/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/495869/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/30131\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020437\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020438\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020440\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020448\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020449\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020548\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020560\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020561\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020575\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020576\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020577\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020578\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020579\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020651\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020653\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020702\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020802\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1020804\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-622-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-627-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA08-190A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA08-190B.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA08-260A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2008-0014.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2019/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2023/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2025/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2029/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2030/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2050/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2051/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2052/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2055/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2092/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2113/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2114/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2123/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2139/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2166/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2195/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2196/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2197/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2268\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2291\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2334\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2342\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2377\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2383\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2384\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2466\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2467\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2482\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2525\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2549\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2582\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2584\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0297\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0311\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0622\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Tool Signature\"]}, {\"url\": \"https://www.exploit-db.com/exploits/6122\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/6123\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/6130\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"http://rhn.redhat.com/errata/RHSA-2008-0533.html\", \"lastModified\": \"2008-07-09T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-331\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-1447\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2008-07-08T23:41:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \\\"DNS Insufficient Socket Entropy Vulnerability\\\" or \\\"the Kaminsky bug.\\\"\"},{\"lang\":\"es\",\"value\":\"El protocolo DNS, como es implementado en (1) BIND 8 y 9 en versiones anteriores a 9.5.0-P1, 9.4.2-P1 y 9.3.5-P1; (2) Microsoft DNS en Windows 2000 SP4, XP SP2 y SP3 y Server 2003 SP1 y SP2; y otras implementaciones permiten a atacantes remotos suplantar el tr\u00e1fico DNS a trav\u00e9s de un ataque de un cumplea\u00f1os que usa referencias in-bailiwick para llevar a cabo un envenenamiento del cach\u00e9 contra resolutores recursivos, relacionado con la insifuciente aleatoriedad de la ID de la transacci\u00f3n DNS y los puertos de origen, vulnerabilidad tambi\u00e9n conocida como \\\"DNS Insufficient Socket Entropy Vulnerability\\\" o \\\"the Kaminsky bug\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-331\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBDAFF8-DE44-4E80-B6BD-E341F767F501\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"823BF8BE-2309-4F67-A5E2-EAD98F723468\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F86F790-6247-42F2-9487-3D60A2842F52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*\",\"matchCriteriaId\":\"E3C43D05-40F8-4769-BA6B-A376420EA972\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*\",\"matchCriteriaId\":\"69117328-A5AD-48A5-A56A-0AA8805A113E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*\",\"matchCriteriaId\":\"3ECE18F6-9DDD-4354-9012-B0660E184E83\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*\",\"matchCriteriaId\":\"4A2B4F1C-737D-40DA-B12E-6C664F9A7ECA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*\",\"matchCriteriaId\":\"DBBCB4B2-8007-4AD5-946E-396330E7DC31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*\",\"matchCriteriaId\":\"68758D17-44AF-4472-928C-3B94A7EAD671\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*\",\"matchCriteriaId\":\"76EDD7D7-4567-4007-86A3-95E907616C6A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*\",\"matchCriteriaId\":\"7A933555-D875-47B9-BFA7-E030B04C1197\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*\",\"matchCriteriaId\":\"4BAA5F63-9A88-4B38-B284-B6E6170F12A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*\",\"matchCriteriaId\":\"9F168D81-2D2B-4B75-B907-A8AE2A3523C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*\",\"matchCriteriaId\":\"1778D813-845D-4B79-B9AF-5D4E0B461C75\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*\",\"matchCriteriaId\":\"A2E917A1-AFE1-4AA3-AB80-A69F152BAB51\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*\",\"matchCriteriaId\":\"C8203007-1723-431B-ADDE-C5FE76A88619\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*\",\"matchCriteriaId\":\"423102CB-1FA1-46BB-8345-412F35DB25B7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*\",\"matchCriteriaId\":\"98E956AB-6A8E-4C5D-89D5-52BC374B1D7C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*\",\"matchCriteriaId\":\"676A5A3B-EFE5-4B84-8F8E-CF952003F48F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B339C33-8896-4896-88FF-88E74FDBC543\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*\",\"matchCriteriaId\":\"4902A7BD-0645-4CAC-8EA8-24BD2D8B893A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*\",\"matchCriteriaId\":\"492EA1BE-E678-4300-A690-3BFCD4B233B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*\",\"matchCriteriaId\":\"4E3C9031-F69A-4B6A-A8CB-39027174AA01\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*\",\"matchCriteriaId\":\"D6B5646C-FF04-4D3D-B39E-27C1056962EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*\",\"matchCriteriaId\":\"7361D8F0-FE84-41D0-9C62-F180339DD40A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*\",\"matchCriteriaId\":\"5454336D-724E-4027-A642-1EFCB79C1ADC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3C0D00-DF20-4B46-8A7D-99D963BD921E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E4653A-C63A-4568-BFF2-ECAB7AB5A55C\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Technical Description\"]},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0533.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30925\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30973\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30977\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30979\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30980\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30988\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30989\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30998\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31011\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31012\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31014\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31019\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31022\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31030\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31031\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31033\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31052\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31065\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31072\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31093\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31094\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31137\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31143\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31151\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31152\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31153\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31169\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31197\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31199\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31204\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31207\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31209\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31212\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31213\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31221\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31236\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31237\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31254\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31326\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31354\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31422\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31430\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31451\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31482\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31495\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31588\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31687\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31823\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31882\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31900\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/33178\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/33714\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/33786\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200807-08.xml\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200812-17.xml\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201209-25.xml\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3026\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3129\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX117991\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX118183\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://up2date.astaro.com/2008/08/up2date_7202_released.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1603\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1604\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1605\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1619\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1623\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.doxpara.com/?p=1176\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.doxpara.com/DMK_BO2K8.ppt\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.isc.org/index.pl?/sw/bind/bind-security.php\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/800113\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.nominum.com/asset_upload_file741_2661.pdf\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/viewContent.do?externalId=7000912\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openbsd.org/errata42.html#013_bind\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openbsd.org/errata43.html#004_bind\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.phys.uu.nl/~rombouts/pdnsd.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0789.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/495289/100/0/threaded\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/495869/100/0/threaded\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/30131\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020437\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020438\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020440\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020448\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020449\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020548\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020558\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020560\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020561\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020575\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020576\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020577\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020578\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020579\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020651\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020653\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020702\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020802\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020804\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-622-1\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-627-1\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-190A.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-190B.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-260A.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0014.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2019/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2023/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2025/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2029/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2030/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2050/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2051/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2052/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2055/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2092/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2113/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2114/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2123/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2139/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2166/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2195/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2196/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2197/references\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2268\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2291\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2334\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2342\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2377\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2383\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2384\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2466\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2467\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2482\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2525\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2549\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2558\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2582\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2584\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0297\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0311\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0622\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://www.exploit-db.com/exploits/6122\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/6123\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/6130\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0533.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30977\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30979\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30988\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30989\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31014\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31031\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31033\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31072\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31093\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31094\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31143\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31151\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31153\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31197\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31199\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31204\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31209\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31212\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31213\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31237\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31326\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31354\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31422\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31430\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31451\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31482\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31588\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31687\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31823\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31882\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31900\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/33178\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/33714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/33786\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200807-08.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200812-17.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201209-25.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX117991\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.citrix.com/article/CTX118183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://up2date.astaro.com/2008/08/up2date_7202_released.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.caughq.org/exploits/CAU-EX-2008-0002.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.caughq.org/exploits/CAU-EX-2008-0003.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1605\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1619\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1623\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.doxpara.com/?p=1176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.doxpara.com/DMK_BO2K8.ppt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26668\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26670\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=isg1IZ26672\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.isc.org/index.pl?/sw/bind/bind-security.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/800113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7DWR4J\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.nominum.com/asset_upload_file741_2661.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/viewContent.do?externalId=7000912\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openbsd.org/errata42.html#013_bind\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openbsd.org/errata43.html#004_bind\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.phys.uu.nl/~rombouts/pdnsd.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0789.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/495289/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/495869/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/30131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020437\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020449\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020548\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020560\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020561\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020576\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020577\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020578\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020651\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020702\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1020804\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-622-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-627-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-190A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-190B.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-260A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2019/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2023/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2025/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2029/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2030/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2050/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2051/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2052/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2055/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2092/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2113/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2114/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2123/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2139/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2166/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2195/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2196/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2197/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2268\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2377\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2383\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2482\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2525\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2584\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0622\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/43637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Tool Signature\"]},{\"url\":\"https://www.exploit-db.com/exploits/6122\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/6123\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/6130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"http://rhn.redhat.com/errata/RHSA-2008-0533.html\",\"lastModified\":\"2008-07-09T00:00:00\"}]}}"
}
}
CERTA-2008-AVI-353
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités ont été identifiées sur les mises en œuvre DNS sous Windows. Elles impliquent le client ainsi que le serveur. L'exploitation de ces dernières permet sous certaines conditions de corrompre le cache et de rediriger le trafic d'utilisateurs vers des systèmes illégitimes.
Description
Deux vulnérabilités ont été identifiées sur les mises en œuvre DNS sous Windows. La première concerne la mise en œuvre des requêtes DNS émises par un client ou un serveur. Le port source étant prévisible, il suffit sous certaines conditions, pour forger une réponse malveillante, de deviner l'identifiant de transaction (dont la génération a fait l'objet d'un correctif décrit dans MS08-020). Cette mesure n'est pas suffisante. Une seconde vulnérabilité concerne l'opération de mise en cache pour le serveur DNS. Ce dernier accepte sous certaines conditions de mettre en cache des réponses malveillantes. Les détails précis de cette vulnérabilité ne sont cependant pas connus à la date de rédaction de cet avis.
Solution
Se référer au bulletin de sécurité MS08-037 de Microsoft pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Microsoft Windows Server 2003 x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 x64 Edition ; | ||
| Microsoft | Windows | Microsoft XP Professional x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 Service Pack 1 ; | ||
| Microsoft | Windows | Microsoft Windows XP Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft XP Professional x64 Edition ; | ||
| Microsoft | Windows | Microsoft Windows Server 2008 (systèmes 32-bit et x64). | ||
| Microsoft | Windows | Microsoft Windows Server 2003 SP1 et SP2 pour systèmes Itanium ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft Windows 2000 Server Service Pack 4 ; | ||
| Microsoft | Windows | Microsoft Windows XP Service Pack 3 ; | ||
| Microsoft | Windows | Microsoft Windows 2000 Service Pack 4 ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Windows Server 2003 x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 x64 Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft XP Professional x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft XP Professional x64 Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2008 (syst\u00e8mes 32-bit et x64).",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 SP1 et SP2 pour syst\u00e8mes Itanium ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 2000 Server Service Pack 4 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP Service Pack 3 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 2000 Service Pack 4 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es sur les mises en \u0153uvre DNS sous\nWindows. La premi\u00e8re concerne la mise en \u0153uvre des requ\u00eates DNS \u00e9mises\npar un client ou un serveur. Le port source \u00e9tant pr\u00e9visible, il suffit\nsous certaines conditions, pour forger une r\u00e9ponse malveillante, de\ndeviner l\u0027identifiant de transaction (dont la g\u00e9n\u00e9ration a fait l\u0027objet\nd\u0027un correctif d\u00e9crit dans MS08-020). Cette mesure n\u0027est pas suffisante.\nUne seconde vuln\u00e9rabilit\u00e9 concerne l\u0027op\u00e9ration de mise en cache pour le\nserveur DNS. Ce dernier accepte sous certaines conditions de mettre en\ncache des r\u00e9ponses malveillantes. Les d\u00e9tails pr\u00e9cis de cette\nvuln\u00e9rabilit\u00e9 ne sont cependant pas connus \u00e0 la date de r\u00e9daction de cet\navis.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 MS08-037 de Microsoft pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1454",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1454"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Bloc-notes de Microsoft SVRD, \"MS08-037 : More entropy for the DNS resolver\"\u00a0:",
"url": "http://blogs.technet.com/swi/archive/2008/07/08/ms08-037-more-entropy-in-the-dns-resolver.aspx"
}
],
"reference": "CERTA-2008-AVI-353",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es sur les mises en \u0153uvre DNS sous\nWindows. Elles impliquent le client ainsi que le serveur. L\u0027exploitation\nde ces derni\u00e8res permet sous certaines conditions de corrompre le cache\net de rediriger le trafic d\u0027utilisateurs vers des syst\u00e8mes ill\u00e9gitimes.\n",
"title": "Vuln\u00e9rabilit\u00e9 DNS dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS08-037 du 08 juillet 2008",
"url": "http://www.microsoft.com/technet/security/Bulletin/MS08-037.mspx"
}
]
}
CERTA-2008-AVI-445
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités sont présentes dans les produits VMware. Certaines permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités affectent les produits VMware :
- l'utilitaire de sauvegarde en ligne de commande, VMware Consolidated Backup, présente un défaut de protection des mots de passe ;
- une vulnérabilité dans la fonction OpenProcess est exploitable par un utilisateur local malveillant pour élever ses privilèges ;
- l'exploitation de vulnérabilités dans des ActixeX permet l'exécution de code arbitraire à distance, sur des produits fonctionnant sous Windows ;
- une extension de l'interface de programmation ISAPI de VWware server sous Windows présente un défaut. Son exploitation permet à un utilisateur malveillant de provoquer un déni de service à distance, dans certaines configuration de IIS ;
- une vulnérabilité de Freetype permet à un utilisateur malveillant d'exécuter du code arbitraire ;
- une vulnérabilité de Cairo permet à un utilisateur malveillant d'exécuter du code arbitraire par le biais d'un fichier image PNG spécifiquement conçu ;
- une vulnérabilité de libpng permet à un utilisateur malveillant de provoquer un arrêt inopiné du système par le biais d'un fichier image PNG spécifiquement conçu ;
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ACE 1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare ACE 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Player 1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare Player 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Workstation 6.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Server 1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Workstation 5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectent les produits VMware :\n\n- l\u0027utilitaire de sauvegarde en ligne de commande, VMware Consolidated\n Backup, pr\u00e9sente un d\u00e9faut de protection des mots de passe ;\n- une vuln\u00e9rabilit\u00e9 dans la fonction OpenProcess est exploitable par\n un utilisateur local malveillant pour \u00e9lever ses privil\u00e8ges ;\n- l\u0027exploitation de vuln\u00e9rabilit\u00e9s dans des ActixeX permet l\u0027ex\u00e9cution\n de code arbitraire \u00e0 distance, sur des produits fonctionnant sous\n Windows ;\n- une extension de l\u0027interface de programmation ISAPI de VWware server\n sous Windows pr\u00e9sente un d\u00e9faut. Son exploitation permet \u00e0 un\n utilisateur malveillant de provoquer un d\u00e9ni de service \u00e0 distance,\n dans certaines configuration de IIS ;\n- une vuln\u00e9rabilit\u00e9 de Freetype permet \u00e0 un utilisateur malveillant\n d\u0027ex\u00e9cuter du code arbitraire ;\n- une vuln\u00e9rabilit\u00e9 de Cairo permet \u00e0 un utilisateur malveillant\n d\u0027ex\u00e9cuter du code arbitraire par le biais d\u0027un fichier image PNG\n sp\u00e9cifiquement con\u00e7u ;\n- une vuln\u00e9rabilit\u00e9 de libpng permet \u00e0 un utilisateur malveillant de\n provoquer un arr\u00eat inopin\u00e9 du syst\u00e8me par le biais d\u0027un fichier\n image PNG sp\u00e9cifiquement con\u00e7u ;\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-3694",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3694"
},
{
"name": "CVE-2008-1808",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1808"
},
{
"name": "CVE-2008-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3695"
},
{
"name": "CVE-2008-3692",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3692"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"name": "CVE-2008-3696",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3696"
},
{
"name": "CVE-2007-5269",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5269"
},
{
"name": "CVE-2008-3691",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3691"
},
{
"name": "CVE-2008-2101",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2101"
},
{
"name": "CVE-2007-5503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5503"
},
{
"name": "CVE-2007-5438",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5438"
},
{
"name": "CVE-2008-1807",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1807"
},
{
"name": "CVE-2008-3697",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3697"
},
{
"name": "CVE-2008-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3698"
},
{
"name": "CVE-2008-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3693"
},
{
"name": "CVE-2008-1806",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1806"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMSA-2008-0014 du 30 ao\u00fbt 2008 :",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
}
],
"reference": "CERTA-2008-AVI-445",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans les produits VMware.\nCertaines permettent \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin VMSA-2008-0014 du 30 ao\u00fbt 2008",
"url": null
}
]
}
CERTA-2008-AVI-402
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités ont été identifiées dans Ruby. Les conséquences de l'exploitation de ces dernières sont variées.
Description
Plusieurs vulnérabilités ont été identifiées dans Ruby :
- certaines concernent les niveaux de sûreté dans Ruby, dont des méthodes comme untrace_var() qui ne devraient pas être autorisées à certains niveaux ou la variable \$PROGRAM_NAME modifiable au niveau 4 ;
- une mauvaise manipulation des en-têtes HTTP par WEBrick, et en particulier dans la fonction WEBrick::HTTPUtils.split_header_value() ;
- un mauvais contrôle des appels de fonctions par la bibliothèque DL (dynamic linker).
- une mauvaise génération d'aléas par resolv.rb pour les échanges DNS concernant les identifiants de transactions ou le choix des ports sources.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ruby 1.9 pour la version r18423 ainsi que celles ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Ruby 1.8.7 pour les versions ant\u00e9rieures \u00e0 1.8.7-p72 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Ruby 1.8.6 pour les versions ant\u00e9rieures \u00e0 1.8.6-p287 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans Ruby :\n\n1. certaines concernent les niveaux de s\u00fbret\u00e9 dans Ruby, dont des\n m\u00e9thodes comme untrace_var() qui ne devraient pas \u00eatre autoris\u00e9es \u00e0\n certains niveaux ou la variable \\$PROGRAM_NAME modifiable au niveau\n 4 ;\n2. une mauvaise manipulation des en-t\u00eates HTTP par WEBrick, et en\n particulier dans la fonction WEBrick::HTTPUtils.split_header_value()\n ;\n3. un mauvais contr\u00f4le des appels de fonctions par la biblioth\u00e8que DL\n (dynamic linker).\n4. une mauvaise g\u00e9n\u00e9ration d\u0027al\u00e9as par resolv.rb pour les \u00e9changes DNS\n concernant les identifiants de transactions ou le choix des ports\n sources.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Annonce des changements pour la branche 1.8 de Ruby :",
"url": "http://www.ruby-lang.org/en/news/2008/08/11/ruby-1-8-7-p72-and-1-8-6-p287-released/"
},
{
"title": "Annonce des vuln\u00e9rabilit\u00e9s Ruby publi\u00e9e le 08 et le 11 ao\u00fbt 2008 :",
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiples-vulnerabilities-in-ruby/"
}
],
"reference": "CERTA-2008-AVI-402",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans Ruby. Les cons\u00e9quences\nde l\u0027exploitation de ces derni\u00e8res sont vari\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Ruby",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour des versions Ruby du 08 et 11 ao\u00fbt 2008",
"url": null
}
]
}
CERTA-2008-AVI-463
Vulnerability from certfr_avis - Published: - Updated:None
Description
De multiples vulnérabilités ont été corrigées dans Mac OS X. Celles-ci permettent notamment à une personne malintentionnée d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X Server versions ant\u00e9rieures \u00e0 10.5.5.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X versions ant\u00e9rieures \u00e0 10.5.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Celles-ci\npermettent notamment \u00e0 une personne malintentionn\u00e9e d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3608"
},
{
"name": "CVE-2008-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2376"
},
{
"name": "CVE-2008-2332",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2332"
},
{
"name": "CVE-2008-1483",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1483"
},
{
"name": "CVE-2008-1835",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1835"
},
{
"name": "CVE-2008-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3618"
},
{
"name": "CVE-2008-2331",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2331"
},
{
"name": "CVE-2008-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1382"
},
{
"name": "CVE-2008-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3617"
},
{
"name": "CVE-2008-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1100"
},
{
"name": "CVE-2008-2329",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2329"
},
{
"name": "CVE-2008-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3610"
},
{
"name": "CVE-2008-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3215"
},
{
"name": "CVE-2008-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2327"
},
{
"name": "CVE-2008-2713",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2713"
},
{
"name": "CVE-2008-3622",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3622"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"name": "CVE-2008-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2305"
},
{
"name": "CVE-2008-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3619"
},
{
"name": "CVE-2008-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1387"
},
{
"name": "CVE-2008-2330",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2330"
},
{
"name": "CVE-2008-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2312"
},
{
"name": "CVE-2008-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3616"
},
{
"name": "CVE-2008-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1833"
},
{
"name": "CVE-2008-0314",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0314"
},
{
"name": "CVE-2008-1657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1657"
},
{
"name": "CVE-2008-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1836"
},
{
"name": "CVE-2008-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3609"
},
{
"name": "CVE-2008-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3613"
},
{
"name": "CVE-2008-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3621"
},
{
"name": "CVE-2008-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1837"
},
{
"name": "CVE-2008-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3611"
},
{
"name": "CVE-2008-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3614"
}
],
"links": [],
"reference": "CERTA-2008-AVI-463",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-09-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans MacOSX",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2008-006",
"url": "http://support.apple.com/kb/HT3137"
}
]
}
CERTA-2008-AVI-402
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités ont été identifiées dans Ruby. Les conséquences de l'exploitation de ces dernières sont variées.
Description
Plusieurs vulnérabilités ont été identifiées dans Ruby :
- certaines concernent les niveaux de sûreté dans Ruby, dont des méthodes comme untrace_var() qui ne devraient pas être autorisées à certains niveaux ou la variable \$PROGRAM_NAME modifiable au niveau 4 ;
- une mauvaise manipulation des en-têtes HTTP par WEBrick, et en particulier dans la fonction WEBrick::HTTPUtils.split_header_value() ;
- un mauvais contrôle des appels de fonctions par la bibliothèque DL (dynamic linker).
- une mauvaise génération d'aléas par resolv.rb pour les échanges DNS concernant les identifiants de transactions ou le choix des ports sources.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ruby 1.9 pour la version r18423 ainsi que celles ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Ruby 1.8.7 pour les versions ant\u00e9rieures \u00e0 1.8.7-p72 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Ruby 1.8.6 pour les versions ant\u00e9rieures \u00e0 1.8.6-p287 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans Ruby :\n\n1. certaines concernent les niveaux de s\u00fbret\u00e9 dans Ruby, dont des\n m\u00e9thodes comme untrace_var() qui ne devraient pas \u00eatre autoris\u00e9es \u00e0\n certains niveaux ou la variable \\$PROGRAM_NAME modifiable au niveau\n 4 ;\n2. une mauvaise manipulation des en-t\u00eates HTTP par WEBrick, et en\n particulier dans la fonction WEBrick::HTTPUtils.split_header_value()\n ;\n3. un mauvais contr\u00f4le des appels de fonctions par la biblioth\u00e8que DL\n (dynamic linker).\n4. une mauvaise g\u00e9n\u00e9ration d\u0027al\u00e9as par resolv.rb pour les \u00e9changes DNS\n concernant les identifiants de transactions ou le choix des ports\n sources.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Annonce des changements pour la branche 1.8 de Ruby :",
"url": "http://www.ruby-lang.org/en/news/2008/08/11/ruby-1-8-7-p72-and-1-8-6-p287-released/"
},
{
"title": "Annonce des vuln\u00e9rabilit\u00e9s Ruby publi\u00e9e le 08 et le 11 ao\u00fbt 2008 :",
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiples-vulnerabilities-in-ruby/"
}
],
"reference": "CERTA-2008-AVI-402",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans Ruby. Les cons\u00e9quences\nde l\u0027exploitation de ces derni\u00e8res sont vari\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Ruby",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour des versions Ruby du 08 et 11 ao\u00fbt 2008",
"url": null
}
]
}
CERTA-2008-AVI-358
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans les produits Cisco permet à une personne malintentionnée de contourner la politique de sécurité.
Description
Une vulnérabilité affecte l'attribution aléatoire des identifiants de transaction et des ports source des serveurs DNS des produits Cisco. Cette vulnérabilité permet à une personne malveillante de contourner la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco Network Registar (CNR) 7.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS R12.x ;",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS 12.x ;",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Application and Content Networking System (ACNS) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco CNS Network Registar 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 affecte l\u0027attribution al\u00e9atoire des identifiants de\ntransaction et des ports source des serveurs DNS des produits Cisco.\nCette vuln\u00e9rabilit\u00e9 permet \u00e0 une personne malveillante de contourner la\npolitique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [],
"reference": "CERTA-2008-AVI-358",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans les produits \u003cspan class=\"textit\"\u003eCisco\u003c/span\u003e\npermet \u00e0 une personne malintentionn\u00e9e de contourner la politique de\ns\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco 20080708-dns du 08 juillet 2008",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml"
}
]
}
CERTA-2008-AVI-359
Vulnerability from certfr_avis - Published: - Updated:
Des vulnérabilités ont été identifiées dans le serveur DNS ISC BIND. Elles permettraient à des personnes malveillantes de corrompre, sous certaines conditions, le cache et ainsi de rediriger du trafic vers des machines illégitimes.
Description
Des vulnérabilités ont été identifiées dans le serveur DNS ISC BIND. En particulier, le serveur ISC BIND utilise une plage de ports source trop restreinte pour émettre des requêtes DNS. Le serveur ne change également pas assez fréquemment ces valeurs de ports source. Ceci peut être exploité sous certaines conditions par une personne malveillante afin de corrompre le cache et rediriger du trafic vers des machines illégitimes.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- les versions d'ISC BIND antérieures à 9.5.0-P1 ;
- les versions d'ISC BIND antérieures à 9.4.2-P1 ;
- les versions d'ISC BIND antérieures à 9.3.5-P1.
La branche 8.x d'ISC BIND n'est plus maintenue depuis la fin du mois d'août 2007 et la dernière version disponible 8.4.7-P1 n'est donc pas corrigée.
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cUL\u003e \u003cLI\u003eles versions d\u0027ISC BIND ant\u00e9rieures \u00e0 9.5.0-P1 ;\u003c/LI\u003e \u003cLI\u003eles versions d\u0027ISC BIND ant\u00e9rieures \u00e0 9.4.2-P1 ;\u003c/LI\u003e \u003cLI\u003eles versions d\u0027ISC BIND ant\u00e9rieures \u00e0 9.3.5-P1.\u003c/LI\u003e \u003c/UL\u003e \u003cP\u003eLa branche 8.x d\u0027ISC BIND n\u0027est plus maintenue depuis la fin du mois d\u0027ao\u00fbt 2007 et la derni\u00e8re version disponible 8.4.7-P1 n\u0027est donc pas corrig\u00e9e.\u003c/P\u003e",
"content": "## Description\n\nDes vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le serveur DNS ISC BIND. En\nparticulier, le serveur ISC BIND utilise une plage de ports source trop\nrestreinte pour \u00e9mettre des requ\u00eates DNS. Le serveur ne change \u00e9galement\npas assez fr\u00e9quemment ces valeurs de ports source. Ceci peut \u00eatre\nexploit\u00e9 sous certaines conditions par une personne malveillante afin de\ncorrompre le cache et rediriger du trafic vers des machines ill\u00e9gitimes.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Liste des mises \u00e0 jour OpenBSD 4.3 :",
"url": "http://www.openbsd.org/errata43.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD FreeBSD-SA-08:06.bind du 13 juillet 2008 :",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1604-1 du 08 juillet 2008 : http://lists.debian.org/debian-security-announce/2008/msg00185.html",
"url": "http://list.debian.org/debian-security-announce/2008/msg00185.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2008-1447 :",
"url": "http://cve/mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris #239392 du 08 juillet 2008 :",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"title": "Liste des mises \u00e0 jour OpenBSD 4.2 :",
"url": "http://www.openbsd.org/errata42.html"
},
{
"title": "Notes de mise \u00e0 jour pour la version 9.4.2-P1 :",
"url": "http://www.isc.org/sw/bind/view/?release=9.4.2-P1#RELEASE"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1603-1 du 08 juillet 2008 :",
"url": "http://list.debian.org/debian-security-announce/2008/msg00184.html"
},
{
"title": "Notes de mise \u00e0 jour pour la version 9.3.5-P1 :",
"url": "http://www.isc.org/sw/bind/view/?release=9.3.5-P1#RELEASE"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP-UX HPSBUX02351 SSRT080058 du 17 juillet 2008 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01506861"
},
{
"title": "Notes de mise \u00e0 jour pour la version 9.5.0-P1 :",
"url": "http://www.isc.org/sw/bind/view/?release=9.5.0-P1#RELEASE"
},
{
"title": "Site officiel de l\u0027ISC BIND :",
"url": "http://www.isc.org/sw/bind/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RSA-2008:0533-3 du 08 juillet 2008 :",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
}
],
"reference": "CERTA-2008-AVI-359",
"revisions": [
{
"description": "ajout des r\u00e9f\u00e9rences au CVE et aux bulletins de s\u00e9curit\u00e9 Debian, Red Hat et Sun.",
"revision_date": "2008-07-09T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2008-07-16T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux correctifs pour OpenBSD et du bulletin de s\u00e9curit\u00e9 HP-UX.",
"revision_date": "2008-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Des vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le serveur DNS ISC BIND.\nElles permettraient \u00e0 des personnes malveillantes de corrompre, sous\ncertaines conditions, le cache et ainsi de rediriger du trafic vers des\nmachines ill\u00e9gitimes.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans ISC BIND",
"vendor_advisories": [
{
"published_at": null,
"title": "Annonce de mise \u00e0 jour ISC BIND du 08 juillet 2008",
"url": null
}
]
}
CERTA-2008-AVI-388
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités permettant entre autres l'exécution de code arbitraire à distance, et concernant le système d'exploitaiton Mac OS X, ont été corrigées.
Description
Plusieurs vulnérabilités concernant Mac OS X ont été corrigées :
- Open Scripting Architecture : une mauvaise gestion des droits des plugins permet à un utilisateur malveillant local d'élever ses privilèges.
- BIND : une mauvaise gestion de l'aléa et un vulnérabilité protocolaire permettent de corrompre le cache du DNS.
- CarbonCore : une vulnérabilité dans les gestion des noms longs de fichier permet l'exécution de code arbitraire.
- CoreGraphics : une corruption de mémoire permet l'exécution de code arbitraire, par exemple à l'aide d'un site Web spécifiquement réalisé.
- CoreGraphics : un dépassement d'entier lors de la gestion de fichiers au format PDF permet l'exécution de code arbitraire.
- Data Detectors Engine : la visualisation d'un message spécifiquement créé permet de provoquer un déni de service de l'application.
- Disk Utility : après l'utilisation de l'outil Repair Permissions il est possible d'exécuter des commandes avec les droits sytème à l'aide d'emacs.
- OpenLDAP : un message spécifiquement réalisé permet de provoquer un déni de service de l'application.
- OpenSSL : une vulnérabilité dans la fonction SSL_get_shared_ciphers() permet de provoquer un déni de service de l'application.
- PHP : plusieurs vulnérabilités, dont certaines permettant l'exécution de code arbitraire, ont été corrigées.
- QuickLook : un document au format Microsoft Office spécifiquement réalisé permet l'exécution de code arbitraire.
- rsync : l'utilisation de liens symboliques permet de modifier des fichiers hors du module.
Solution
Se référer au bulletin de sécurité d'Apple HT2647 du 1 août 2008 pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.4.11 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.5.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s concernant Mac OS X ont \u00e9t\u00e9 corrig\u00e9es :\n\n- Open Scripting Architecture : une mauvaise gestion des droits des\n plugins permet \u00e0 un utilisateur malveillant local d\u0027\u00e9lever ses\n privil\u00e8ges.\n- BIND : une mauvaise gestion de l\u0027al\u00e9a et un vuln\u00e9rabilit\u00e9\n protocolaire permettent de corrompre le cache du DNS.\n- CarbonCore : une vuln\u00e9rabilit\u00e9 dans les gestion des noms longs de\n fichier permet l\u0027ex\u00e9cution de code arbitraire.\n- CoreGraphics : une corruption de m\u00e9moire permet l\u0027ex\u00e9cution de code\n arbitraire, par exemple \u00e0 l\u0027aide d\u0027un site Web sp\u00e9cifiquement\n r\u00e9alis\u00e9.\n- CoreGraphics : un d\u00e9passement d\u0027entier lors de la gestion de\n fichiers au format PDF permet l\u0027ex\u00e9cution de code arbitraire.\n- Data Detectors Engine : la visualisation d\u0027un message sp\u00e9cifiquement\n cr\u00e9\u00e9 permet de provoquer un d\u00e9ni de service de l\u0027application.\n- Disk Utility : apr\u00e8s l\u0027utilisation de l\u0027outil Repair Permissions il\n est possible d\u0027ex\u00e9cuter des commandes avec les droits syt\u00e8me \u00e0\n l\u0027aide d\u0027emacs.\n- OpenLDAP : un message sp\u00e9cifiquement r\u00e9alis\u00e9 permet de provoquer un\n d\u00e9ni de service de l\u0027application.\n- OpenSSL : une vuln\u00e9rabilit\u00e9 dans la fonction\n SSL_get_shared_ciphers() permet de provoquer un d\u00e9ni de service de\n l\u0027application.\n- PHP : plusieurs vuln\u00e9rabilit\u00e9s, dont certaines permettant\n l\u0027ex\u00e9cution de code arbitraire, ont \u00e9t\u00e9 corrig\u00e9es.\n- QuickLook : un document au format Microsoft Office sp\u00e9cifiquement\n r\u00e9alis\u00e9 permet l\u0027ex\u00e9cution de code arbitraire.\n- rsync : l\u0027utilisation de liens symboliques permet de modifier des\n fichiers hors du module.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 d\u0027Apple HT2647 du 1 ao\u00fbt 2008 pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2324"
},
{
"name": "CVE-2007-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5135"
},
{
"name": "CVE-2007-6200",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6200"
},
{
"name": "CVE-2008-2051",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2051"
},
{
"name": "CVE-2008-2322",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2322"
},
{
"name": "CVE-2008-0674",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0674"
},
{
"name": "CVE-2008-2325",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2325"
},
{
"name": "CVE-2007-6199",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6199"
},
{
"name": "CVE-2008-2320",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2320"
},
{
"name": "CVE-2008-0599",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0599"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"name": "CVE-2007-4850",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4850"
},
{
"name": "CVE-2008-2323",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2323"
},
{
"name": "CVE-2008-2050",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2050"
},
{
"name": "CVE-2008-2321",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2321"
},
{
"name": "CVE-2008-2952",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2952"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT2647 du 01 ao\u00fbt 2008 :",
"url": "http://support.apple.com/kb/HT2647"
}
],
"reference": "CERTA-2008-AVI-388",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s permettant entre autres l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance, et concernant le syst\u00e8me d\u0027exploitaiton Mac OS X,\nont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT2647 du 1 ao\u00fbt 2008",
"url": null
}
]
}
CERTA-2008-AVI-388
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités permettant entre autres l'exécution de code arbitraire à distance, et concernant le système d'exploitaiton Mac OS X, ont été corrigées.
Description
Plusieurs vulnérabilités concernant Mac OS X ont été corrigées :
- Open Scripting Architecture : une mauvaise gestion des droits des plugins permet à un utilisateur malveillant local d'élever ses privilèges.
- BIND : une mauvaise gestion de l'aléa et un vulnérabilité protocolaire permettent de corrompre le cache du DNS.
- CarbonCore : une vulnérabilité dans les gestion des noms longs de fichier permet l'exécution de code arbitraire.
- CoreGraphics : une corruption de mémoire permet l'exécution de code arbitraire, par exemple à l'aide d'un site Web spécifiquement réalisé.
- CoreGraphics : un dépassement d'entier lors de la gestion de fichiers au format PDF permet l'exécution de code arbitraire.
- Data Detectors Engine : la visualisation d'un message spécifiquement créé permet de provoquer un déni de service de l'application.
- Disk Utility : après l'utilisation de l'outil Repair Permissions il est possible d'exécuter des commandes avec les droits sytème à l'aide d'emacs.
- OpenLDAP : un message spécifiquement réalisé permet de provoquer un déni de service de l'application.
- OpenSSL : une vulnérabilité dans la fonction SSL_get_shared_ciphers() permet de provoquer un déni de service de l'application.
- PHP : plusieurs vulnérabilités, dont certaines permettant l'exécution de code arbitraire, ont été corrigées.
- QuickLook : un document au format Microsoft Office spécifiquement réalisé permet l'exécution de code arbitraire.
- rsync : l'utilisation de liens symboliques permet de modifier des fichiers hors du module.
Solution
Se référer au bulletin de sécurité d'Apple HT2647 du 1 août 2008 pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.4.11 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.5.4.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s concernant Mac OS X ont \u00e9t\u00e9 corrig\u00e9es :\n\n- Open Scripting Architecture : une mauvaise gestion des droits des\n plugins permet \u00e0 un utilisateur malveillant local d\u0027\u00e9lever ses\n privil\u00e8ges.\n- BIND : une mauvaise gestion de l\u0027al\u00e9a et un vuln\u00e9rabilit\u00e9\n protocolaire permettent de corrompre le cache du DNS.\n- CarbonCore : une vuln\u00e9rabilit\u00e9 dans les gestion des noms longs de\n fichier permet l\u0027ex\u00e9cution de code arbitraire.\n- CoreGraphics : une corruption de m\u00e9moire permet l\u0027ex\u00e9cution de code\n arbitraire, par exemple \u00e0 l\u0027aide d\u0027un site Web sp\u00e9cifiquement\n r\u00e9alis\u00e9.\n- CoreGraphics : un d\u00e9passement d\u0027entier lors de la gestion de\n fichiers au format PDF permet l\u0027ex\u00e9cution de code arbitraire.\n- Data Detectors Engine : la visualisation d\u0027un message sp\u00e9cifiquement\n cr\u00e9\u00e9 permet de provoquer un d\u00e9ni de service de l\u0027application.\n- Disk Utility : apr\u00e8s l\u0027utilisation de l\u0027outil Repair Permissions il\n est possible d\u0027ex\u00e9cuter des commandes avec les droits syt\u00e8me \u00e0\n l\u0027aide d\u0027emacs.\n- OpenLDAP : un message sp\u00e9cifiquement r\u00e9alis\u00e9 permet de provoquer un\n d\u00e9ni de service de l\u0027application.\n- OpenSSL : une vuln\u00e9rabilit\u00e9 dans la fonction\n SSL_get_shared_ciphers() permet de provoquer un d\u00e9ni de service de\n l\u0027application.\n- PHP : plusieurs vuln\u00e9rabilit\u00e9s, dont certaines permettant\n l\u0027ex\u00e9cution de code arbitraire, ont \u00e9t\u00e9 corrig\u00e9es.\n- QuickLook : un document au format Microsoft Office sp\u00e9cifiquement\n r\u00e9alis\u00e9 permet l\u0027ex\u00e9cution de code arbitraire.\n- rsync : l\u0027utilisation de liens symboliques permet de modifier des\n fichiers hors du module.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 d\u0027Apple HT2647 du 1 ao\u00fbt 2008 pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2324"
},
{
"name": "CVE-2007-5135",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5135"
},
{
"name": "CVE-2007-6200",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6200"
},
{
"name": "CVE-2008-2051",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2051"
},
{
"name": "CVE-2008-2322",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2322"
},
{
"name": "CVE-2008-0674",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0674"
},
{
"name": "CVE-2008-2325",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2325"
},
{
"name": "CVE-2007-6199",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6199"
},
{
"name": "CVE-2008-2320",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2320"
},
{
"name": "CVE-2008-0599",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0599"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"name": "CVE-2007-4850",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4850"
},
{
"name": "CVE-2008-2323",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2323"
},
{
"name": "CVE-2008-2050",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2050"
},
{
"name": "CVE-2008-2321",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2321"
},
{
"name": "CVE-2008-2952",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2952"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT2647 du 01 ao\u00fbt 2008 :",
"url": "http://support.apple.com/kb/HT2647"
}
],
"reference": "CERTA-2008-AVI-388",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s permettant entre autres l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance, et concernant le syst\u00e8me d\u0027exploitaiton Mac OS X,\nont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT2647 du 1 ao\u00fbt 2008",
"url": null
}
]
}
CERTA-2008-AVI-353
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités ont été identifiées sur les mises en œuvre DNS sous Windows. Elles impliquent le client ainsi que le serveur. L'exploitation de ces dernières permet sous certaines conditions de corrompre le cache et de rediriger le trafic d'utilisateurs vers des systèmes illégitimes.
Description
Deux vulnérabilités ont été identifiées sur les mises en œuvre DNS sous Windows. La première concerne la mise en œuvre des requêtes DNS émises par un client ou un serveur. Le port source étant prévisible, il suffit sous certaines conditions, pour forger une réponse malveillante, de deviner l'identifiant de transaction (dont la génération a fait l'objet d'un correctif décrit dans MS08-020). Cette mesure n'est pas suffisante. Une seconde vulnérabilité concerne l'opération de mise en cache pour le serveur DNS. Ce dernier accepte sous certaines conditions de mettre en cache des réponses malveillantes. Les détails précis de cette vulnérabilité ne sont cependant pas connus à la date de rédaction de cet avis.
Solution
Se référer au bulletin de sécurité MS08-037 de Microsoft pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Microsoft Windows Server 2003 x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 x64 Edition ; | ||
| Microsoft | Windows | Microsoft XP Professional x64 Edition Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 Service Pack 1 ; | ||
| Microsoft | Windows | Microsoft Windows XP Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft XP Professional x64 Edition ; | ||
| Microsoft | Windows | Microsoft Windows Server 2008 (systèmes 32-bit et x64). | ||
| Microsoft | Windows | Microsoft Windows Server 2003 SP1 et SP2 pour systèmes Itanium ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft Windows 2000 Server Service Pack 4 ; | ||
| Microsoft | Windows | Microsoft Windows XP Service Pack 3 ; | ||
| Microsoft | Windows | Microsoft Windows 2000 Service Pack 4 ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Windows Server 2003 x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 x64 Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft XP Professional x64 Edition Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft XP Professional x64 Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2008 (syst\u00e8mes 32-bit et x64).",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 SP1 et SP2 pour syst\u00e8mes Itanium ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 2000 Server Service Pack 4 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP Service Pack 3 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 2000 Service Pack 4 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es sur les mises en \u0153uvre DNS sous\nWindows. La premi\u00e8re concerne la mise en \u0153uvre des requ\u00eates DNS \u00e9mises\npar un client ou un serveur. Le port source \u00e9tant pr\u00e9visible, il suffit\nsous certaines conditions, pour forger une r\u00e9ponse malveillante, de\ndeviner l\u0027identifiant de transaction (dont la g\u00e9n\u00e9ration a fait l\u0027objet\nd\u0027un correctif d\u00e9crit dans MS08-020). Cette mesure n\u0027est pas suffisante.\nUne seconde vuln\u00e9rabilit\u00e9 concerne l\u0027op\u00e9ration de mise en cache pour le\nserveur DNS. Ce dernier accepte sous certaines conditions de mettre en\ncache des r\u00e9ponses malveillantes. Les d\u00e9tails pr\u00e9cis de cette\nvuln\u00e9rabilit\u00e9 ne sont cependant pas connus \u00e0 la date de r\u00e9daction de cet\navis.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 MS08-037 de Microsoft pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1454",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1454"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Bloc-notes de Microsoft SVRD, \"MS08-037 : More entropy for the DNS resolver\"\u00a0:",
"url": "http://blogs.technet.com/swi/archive/2008/07/08/ms08-037-more-entropy-in-the-dns-resolver.aspx"
}
],
"reference": "CERTA-2008-AVI-353",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es sur les mises en \u0153uvre DNS sous\nWindows. Elles impliquent le client ainsi que le serveur. L\u0027exploitation\nde ces derni\u00e8res permet sous certaines conditions de corrompre le cache\net de rediriger le trafic d\u0027utilisateurs vers des syst\u00e8mes ill\u00e9gitimes.\n",
"title": "Vuln\u00e9rabilit\u00e9 DNS dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS08-037 du 08 juillet 2008",
"url": "http://www.microsoft.com/technet/security/Bulletin/MS08-037.mspx"
}
]
}
CERTA-2008-AVI-360
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans l'interprétation du protocole DNS par certains produits Juniper. Cette vulnérabilité peut être exploitée afin de corrompre le cache d'un serveur.
Description
Une vulnérabilité a été découverte dans plusieurs produits Juniper. Cette vulnérabilité résulte d'une mauvaise implémentation dans le traitement du protocole et permet à un utilisateur malintentionné de corrompre le cache d'un serveur présentant cette faiblesse.
Des outils permettant l'exploitation de cette vulnérabilité ont été rendus publiques.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation). Des identifiants sont nécessaires pour accéder à la page. Contactez votre support officiel.
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper switches sous JUNOS, version ant\u00e9rieure au 23 Mai 2008.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Firewall sous ScreenOS ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper J-Series Routers sous JUNOS, version ant\u00e9rieure au 23 Mai 2008 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans plusieurs produits Juniper.\nCette vuln\u00e9rabilit\u00e9 r\u00e9sulte d\u0027une mauvaise impl\u00e9mentation dans le\ntraitement du protocole et permet \u00e0 un utilisateur malintentionn\u00e9 de\ncorrompre le cache d\u0027un serveur pr\u00e9sentant cette faiblesse.\n\nDes outils permettant l\u0027exploitation de cette vuln\u00e9rabilit\u00e9 ont \u00e9t\u00e9\nrendus publiques.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation). Des identifiants sont\nn\u00e9cessaires pour acc\u00e9der \u00e0 la page. Contactez votre support officiel.\n",
"cves": [
{
"name": "CVE-2008-1454",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1454"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Alerte de l\u0027AusCERT AL-2008.0080 du 09 juillet 2008 :",
"url": "http://www.auscert.org.au/render.html?it=9546"
},
{
"title": "Bulletin de mise \u00e0 jour Juniper PSN-2008-06-040 :",
"url": "http://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search\u0026txtAlertNumber=PSN-2008-06-040\u0026viewMode=view"
}
],
"reference": "CERTA-2008-AVI-360",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans l\u0027interpr\u00e9tation du protocole\nDNS par certains produits Juniper. Cette vuln\u00e9rabilit\u00e9 peut \u00eatre\nexploit\u00e9e afin de corrompre le cache d\u0027un serveur.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans l\u0027impl\u00e9mentation du protocole DNS par Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Alerte AL-2008.0080 de l\u0027AusCERT du 09 juillet 2008",
"url": null
}
]
}
CERTA-2008-AVI-359
Vulnerability from certfr_avis - Published: - Updated:
Des vulnérabilités ont été identifiées dans le serveur DNS ISC BIND. Elles permettraient à des personnes malveillantes de corrompre, sous certaines conditions, le cache et ainsi de rediriger du trafic vers des machines illégitimes.
Description
Des vulnérabilités ont été identifiées dans le serveur DNS ISC BIND. En particulier, le serveur ISC BIND utilise une plage de ports source trop restreinte pour émettre des requêtes DNS. Le serveur ne change également pas assez fréquemment ces valeurs de ports source. Ceci peut être exploité sous certaines conditions par une personne malveillante afin de corrompre le cache et rediriger du trafic vers des machines illégitimes.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- les versions d'ISC BIND antérieures à 9.5.0-P1 ;
- les versions d'ISC BIND antérieures à 9.4.2-P1 ;
- les versions d'ISC BIND antérieures à 9.3.5-P1.
La branche 8.x d'ISC BIND n'est plus maintenue depuis la fin du mois d'août 2007 et la dernière version disponible 8.4.7-P1 n'est donc pas corrigée.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cUL\u003e \u003cLI\u003eles versions d\u0027ISC BIND ant\u00e9rieures \u00e0 9.5.0-P1 ;\u003c/LI\u003e \u003cLI\u003eles versions d\u0027ISC BIND ant\u00e9rieures \u00e0 9.4.2-P1 ;\u003c/LI\u003e \u003cLI\u003eles versions d\u0027ISC BIND ant\u00e9rieures \u00e0 9.3.5-P1.\u003c/LI\u003e \u003c/UL\u003e \u003cP\u003eLa branche 8.x d\u0027ISC BIND n\u0027est plus maintenue depuis la fin du mois d\u0027ao\u00fbt 2007 et la derni\u00e8re version disponible 8.4.7-P1 n\u0027est donc pas corrig\u00e9e.\u003c/P\u003e",
"content": "## Description\n\nDes vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le serveur DNS ISC BIND. En\nparticulier, le serveur ISC BIND utilise une plage de ports source trop\nrestreinte pour \u00e9mettre des requ\u00eates DNS. Le serveur ne change \u00e9galement\npas assez fr\u00e9quemment ces valeurs de ports source. Ceci peut \u00eatre\nexploit\u00e9 sous certaines conditions par une personne malveillante afin de\ncorrompre le cache et rediriger du trafic vers des machines ill\u00e9gitimes.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Liste des mises \u00e0 jour OpenBSD 4.3 :",
"url": "http://www.openbsd.org/errata43.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD FreeBSD-SA-08:06.bind du 13 juillet 2008 :",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1604-1 du 08 juillet 2008 : http://lists.debian.org/debian-security-announce/2008/msg00185.html",
"url": "http://list.debian.org/debian-security-announce/2008/msg00185.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2008-1447 :",
"url": "http://cve/mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris #239392 du 08 juillet 2008 :",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"title": "Liste des mises \u00e0 jour OpenBSD 4.2 :",
"url": "http://www.openbsd.org/errata42.html"
},
{
"title": "Notes de mise \u00e0 jour pour la version 9.4.2-P1 :",
"url": "http://www.isc.org/sw/bind/view/?release=9.4.2-P1#RELEASE"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1603-1 du 08 juillet 2008 :",
"url": "http://list.debian.org/debian-security-announce/2008/msg00184.html"
},
{
"title": "Notes de mise \u00e0 jour pour la version 9.3.5-P1 :",
"url": "http://www.isc.org/sw/bind/view/?release=9.3.5-P1#RELEASE"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 HP-UX HPSBUX02351 SSRT080058 du 17 juillet 2008 :",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01506861"
},
{
"title": "Notes de mise \u00e0 jour pour la version 9.5.0-P1 :",
"url": "http://www.isc.org/sw/bind/view/?release=9.5.0-P1#RELEASE"
},
{
"title": "Site officiel de l\u0027ISC BIND :",
"url": "http://www.isc.org/sw/bind/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RSA-2008:0533-3 du 08 juillet 2008 :",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
}
],
"reference": "CERTA-2008-AVI-359",
"revisions": [
{
"description": "ajout des r\u00e9f\u00e9rences au CVE et aux bulletins de s\u00e9curit\u00e9 Debian, Red Hat et Sun.",
"revision_date": "2008-07-09T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2008-07-16T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux correctifs pour OpenBSD et du bulletin de s\u00e9curit\u00e9 HP-UX.",
"revision_date": "2008-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Des vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le serveur DNS ISC BIND.\nElles permettraient \u00e0 des personnes malveillantes de corrompre, sous\ncertaines conditions, le cache et ainsi de rediriger du trafic vers des\nmachines ill\u00e9gitimes.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans ISC BIND",
"vendor_advisories": [
{
"published_at": null,
"title": "Annonce de mise \u00e0 jour ISC BIND du 08 juillet 2008",
"url": null
}
]
}
CERTA-2008-AVI-375
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités permettant une modification arbitraire du cache DNS et un déni de service à distance ont été corrigées dans dnsmasq.
Description
Une faiblesse dans l'aléa du choix des identifiants de transactions et des numéros de ports sources permet la modification arbitraire du cache DNS via des requêtes spécifiquement construites. De plus, une vulnérabilité lors du renouvellement du bail DHCP d' un client est exploitable pour provoquer un déni de service à distance.
Solution
Se référer au bulletin d'annonces de mise à jour de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Les versions antérieures à la 2.45.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eLes versions ant\u00e9rieures \u00e0 la 2.45.\u003c/P\u003e",
"content": "## Description\n\nUne faiblesse dans l\u0027al\u00e9a du choix des identifiants de transactions et\ndes num\u00e9ros de ports sources permet la modification arbitraire du cache\nDNS via des requ\u00eates sp\u00e9cifiquement construites. De plus, une\nvuln\u00e9rabilit\u00e9 lors du renouvellement du bail DHCP d\u0027 un client est\nexploitable pour provoquer un d\u00e9ni de service \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin d\u0027annonces de mise \u00e0 jour de l\u0027\u00e9diteur pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Annonces de mise \u00e0 jour des versions 2.43, 2.44 et 2.45 de juillet 2008 :",
"url": "http://thekelleys.org.uk/dnsmask/CHANGELOG"
}
],
"reference": "CERTA-2008-AVI-375",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s permettant une modification arbitraire du cache DNS\net un d\u00e9ni de service \u00e0 distance ont \u00e9t\u00e9 corrig\u00e9es dans dnsmasq.\n",
"title": "Multiples vuln\u00e9abilit\u00e9s dans dnsmasq",
"vendor_advisories": [
{
"published_at": null,
"title": "Annonces de mise \u00e0 jour des versions 2.43, 2.44 et 2.45 de juillet 2008",
"url": null
}
]
}
CERTA-2008-AVI-445
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités sont présentes dans les produits VMware. Certaines permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités affectent les produits VMware :
- l'utilitaire de sauvegarde en ligne de commande, VMware Consolidated Backup, présente un défaut de protection des mots de passe ;
- une vulnérabilité dans la fonction OpenProcess est exploitable par un utilisateur local malveillant pour élever ses privilèges ;
- l'exploitation de vulnérabilités dans des ActixeX permet l'exécution de code arbitraire à distance, sur des produits fonctionnant sous Windows ;
- une extension de l'interface de programmation ISAPI de VWware server sous Windows présente un défaut. Son exploitation permet à un utilisateur malveillant de provoquer un déni de service à distance, dans certaines configuration de IIS ;
- une vulnérabilité de Freetype permet à un utilisateur malveillant d'exécuter du code arbitraire ;
- une vulnérabilité de Cairo permet à un utilisateur malveillant d'exécuter du code arbitraire par le biais d'un fichier image PNG spécifiquement conçu ;
- une vulnérabilité de libpng permet à un utilisateur malveillant de provoquer un arrêt inopiné du système par le biais d'un fichier image PNG spécifiquement conçu ;
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ACE 1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare ACE 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Player 1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMWare Player 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Workstation 6.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Server 1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Workstation 5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectent les produits VMware :\n\n- l\u0027utilitaire de sauvegarde en ligne de commande, VMware Consolidated\n Backup, pr\u00e9sente un d\u00e9faut de protection des mots de passe ;\n- une vuln\u00e9rabilit\u00e9 dans la fonction OpenProcess est exploitable par\n un utilisateur local malveillant pour \u00e9lever ses privil\u00e8ges ;\n- l\u0027exploitation de vuln\u00e9rabilit\u00e9s dans des ActixeX permet l\u0027ex\u00e9cution\n de code arbitraire \u00e0 distance, sur des produits fonctionnant sous\n Windows ;\n- une extension de l\u0027interface de programmation ISAPI de VWware server\n sous Windows pr\u00e9sente un d\u00e9faut. Son exploitation permet \u00e0 un\n utilisateur malveillant de provoquer un d\u00e9ni de service \u00e0 distance,\n dans certaines configuration de IIS ;\n- une vuln\u00e9rabilit\u00e9 de Freetype permet \u00e0 un utilisateur malveillant\n d\u0027ex\u00e9cuter du code arbitraire ;\n- une vuln\u00e9rabilit\u00e9 de Cairo permet \u00e0 un utilisateur malveillant\n d\u0027ex\u00e9cuter du code arbitraire par le biais d\u0027un fichier image PNG\n sp\u00e9cifiquement con\u00e7u ;\n- une vuln\u00e9rabilit\u00e9 de libpng permet \u00e0 un utilisateur malveillant de\n provoquer un arr\u00eat inopin\u00e9 du syst\u00e8me par le biais d\u0027un fichier\n image PNG sp\u00e9cifiquement con\u00e7u ;\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-3694",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3694"
},
{
"name": "CVE-2008-1808",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1808"
},
{
"name": "CVE-2008-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3695"
},
{
"name": "CVE-2008-3692",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3692"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"name": "CVE-2008-3696",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3696"
},
{
"name": "CVE-2007-5269",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5269"
},
{
"name": "CVE-2008-3691",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3691"
},
{
"name": "CVE-2008-2101",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2101"
},
{
"name": "CVE-2007-5503",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5503"
},
{
"name": "CVE-2007-5438",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5438"
},
{
"name": "CVE-2008-1807",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1807"
},
{
"name": "CVE-2008-3697",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3697"
},
{
"name": "CVE-2008-3698",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3698"
},
{
"name": "CVE-2008-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3693"
},
{
"name": "CVE-2008-1806",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1806"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMSA-2008-0014 du 30 ao\u00fbt 2008 :",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
}
],
"reference": "CERTA-2008-AVI-445",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans les produits VMware.\nCertaines permettent \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin VMSA-2008-0014 du 30 ao\u00fbt 2008",
"url": null
}
]
}
CERTA-2008-AVI-358
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans les produits Cisco permet à une personne malintentionnée de contourner la politique de sécurité.
Description
Une vulnérabilité affecte l'attribution aléatoire des identifiants de transaction et des ports source des serveurs DNS des produits Cisco. Cette vulnérabilité permet à une personne malveillante de contourner la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco Network Registar (CNR) 7.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS R12.x ;",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS 12.x ;",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Application and Content Networking System (ACNS) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco CNS Network Registar 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 affecte l\u0027attribution al\u00e9atoire des identifiants de\ntransaction et des ports source des serveurs DNS des produits Cisco.\nCette vuln\u00e9rabilit\u00e9 permet \u00e0 une personne malveillante de contourner la\npolitique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [],
"reference": "CERTA-2008-AVI-358",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans les produits \u003cspan class=\"textit\"\u003eCisco\u003c/span\u003e\npermet \u00e0 une personne malintentionn\u00e9e de contourner la politique de\ns\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco 20080708-dns du 08 juillet 2008",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml"
}
]
}
CERTA-2008-AVI-375
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités permettant une modification arbitraire du cache DNS et un déni de service à distance ont été corrigées dans dnsmasq.
Description
Une faiblesse dans l'aléa du choix des identifiants de transactions et des numéros de ports sources permet la modification arbitraire du cache DNS via des requêtes spécifiquement construites. De plus, une vulnérabilité lors du renouvellement du bail DHCP d' un client est exploitable pour provoquer un déni de service à distance.
Solution
Se référer au bulletin d'annonces de mise à jour de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Les versions antérieures à la 2.45.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eLes versions ant\u00e9rieures \u00e0 la 2.45.\u003c/P\u003e",
"content": "## Description\n\nUne faiblesse dans l\u0027al\u00e9a du choix des identifiants de transactions et\ndes num\u00e9ros de ports sources permet la modification arbitraire du cache\nDNS via des requ\u00eates sp\u00e9cifiquement construites. De plus, une\nvuln\u00e9rabilit\u00e9 lors du renouvellement du bail DHCP d\u0027 un client est\nexploitable pour provoquer un d\u00e9ni de service \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin d\u0027annonces de mise \u00e0 jour de l\u0027\u00e9diteur pour\nl\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Annonces de mise \u00e0 jour des versions 2.43, 2.44 et 2.45 de juillet 2008 :",
"url": "http://thekelleys.org.uk/dnsmask/CHANGELOG"
}
],
"reference": "CERTA-2008-AVI-375",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s permettant une modification arbitraire du cache DNS\net un d\u00e9ni de service \u00e0 distance ont \u00e9t\u00e9 corrig\u00e9es dans dnsmasq.\n",
"title": "Multiples vuln\u00e9abilit\u00e9s dans dnsmasq",
"vendor_advisories": [
{
"published_at": null,
"title": "Annonces de mise \u00e0 jour des versions 2.43, 2.44 et 2.45 de juillet 2008",
"url": null
}
]
}
CERTA-2008-AVI-463
Vulnerability from certfr_avis - Published: - Updated:None
Description
De multiples vulnérabilités ont été corrigées dans Mac OS X. Celles-ci permettent notamment à une personne malintentionnée d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X Server versions ant\u00e9rieures \u00e0 10.5.5.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X versions ant\u00e9rieures \u00e0 10.5.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Celles-ci\npermettent notamment \u00e0 une personne malintentionn\u00e9e d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3608"
},
{
"name": "CVE-2008-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2376"
},
{
"name": "CVE-2008-2332",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2332"
},
{
"name": "CVE-2008-1483",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1483"
},
{
"name": "CVE-2008-1835",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1835"
},
{
"name": "CVE-2008-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3618"
},
{
"name": "CVE-2008-2331",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2331"
},
{
"name": "CVE-2008-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1382"
},
{
"name": "CVE-2008-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3617"
},
{
"name": "CVE-2008-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1100"
},
{
"name": "CVE-2008-2329",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2329"
},
{
"name": "CVE-2008-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3610"
},
{
"name": "CVE-2008-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3215"
},
{
"name": "CVE-2008-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2327"
},
{
"name": "CVE-2008-2713",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2713"
},
{
"name": "CVE-2008-3622",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3622"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"name": "CVE-2008-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2305"
},
{
"name": "CVE-2008-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3619"
},
{
"name": "CVE-2008-1387",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1387"
},
{
"name": "CVE-2008-2330",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2330"
},
{
"name": "CVE-2008-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2312"
},
{
"name": "CVE-2008-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3616"
},
{
"name": "CVE-2008-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1833"
},
{
"name": "CVE-2008-0314",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0314"
},
{
"name": "CVE-2008-1657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1657"
},
{
"name": "CVE-2008-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1836"
},
{
"name": "CVE-2008-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3609"
},
{
"name": "CVE-2008-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3613"
},
{
"name": "CVE-2008-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3621"
},
{
"name": "CVE-2008-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1837"
},
{
"name": "CVE-2008-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3611"
},
{
"name": "CVE-2008-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3614"
}
],
"links": [],
"reference": "CERTA-2008-AVI-463",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-09-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans MacOSX",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2008-006",
"url": "http://support.apple.com/kb/HT3137"
}
]
}
CERTA-2008-AVI-360
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans l'interprétation du protocole DNS par certains produits Juniper. Cette vulnérabilité peut être exploitée afin de corrompre le cache d'un serveur.
Description
Une vulnérabilité a été découverte dans plusieurs produits Juniper. Cette vulnérabilité résulte d'une mauvaise implémentation dans le traitement du protocole et permet à un utilisateur malintentionné de corrompre le cache d'un serveur présentant cette faiblesse.
Des outils permettant l'exploitation de cette vulnérabilité ont été rendus publiques.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation). Des identifiants sont nécessaires pour accéder à la page. Contactez votre support officiel.
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper switches sous JUNOS, version ant\u00e9rieure au 23 Mai 2008.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Firewall sous ScreenOS ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper J-Series Routers sous JUNOS, version ant\u00e9rieure au 23 Mai 2008 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans plusieurs produits Juniper.\nCette vuln\u00e9rabilit\u00e9 r\u00e9sulte d\u0027une mauvaise impl\u00e9mentation dans le\ntraitement du protocole et permet \u00e0 un utilisateur malintentionn\u00e9 de\ncorrompre le cache d\u0027un serveur pr\u00e9sentant cette faiblesse.\n\nDes outils permettant l\u0027exploitation de cette vuln\u00e9rabilit\u00e9 ont \u00e9t\u00e9\nrendus publiques.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation). Des identifiants sont\nn\u00e9cessaires pour acc\u00e9der \u00e0 la page. Contactez votre support officiel.\n",
"cves": [
{
"name": "CVE-2008-1454",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1454"
},
{
"name": "CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
}
],
"links": [
{
"title": "Alerte de l\u0027AusCERT AL-2008.0080 du 09 juillet 2008 :",
"url": "http://www.auscert.org.au/render.html?it=9546"
},
{
"title": "Bulletin de mise \u00e0 jour Juniper PSN-2008-06-040 :",
"url": "http://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search\u0026txtAlertNumber=PSN-2008-06-040\u0026viewMode=view"
}
],
"reference": "CERTA-2008-AVI-360",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans l\u0027interpr\u00e9tation du protocole\nDNS par certains produits Juniper. Cette vuln\u00e9rabilit\u00e9 peut \u00eatre\nexploit\u00e9e afin de corrompre le cache d\u0027un serveur.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans l\u0027impl\u00e9mentation du protocole DNS par Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Alerte AL-2008.0080 de l\u0027AusCERT du 09 juillet 2008",
"url": null
}
]
}
RHSA-2008:0789
Vulnerability from csaf_redhat - Published: 2008-08-11 17:02 - Updated: 2025-11-21 17:33The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2008:0789 | self |
| https://access.redhat.com/security/updates/classi… | external |
| http://www.thekelleys.org.uk/dnsmasq/CHANGELOG | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=449345 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2008-1447 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=449345 | external |
| https://www.cve.org/CVERecord?id=CVE-2008-1447 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2008-1447 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated dnsmasq package that implements UDP source-port randomization\nis now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Dnsmasq is lightweight DNS forwarder and DHCP server. It is designed to\nprovide DNS and, optionally, DHCP, to a small network.\n\nThe dnsmasq DNS resolver used a fixed source UDP port. This could have made\nDNS spoofing attacks easier. dnsmasq has been updated to use random UDP\nsource ports, helping to make DNS spoofing attacks harder. (CVE-2008-1447)\n\nAll dnsmasq users are advised to upgrade to this updated package, that\nupgrades dnsmasq to version 2.45, which resolves this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0789",
"url": "https://access.redhat.com/errata/RHSA-2008:0789"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG",
"url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG"
},
{
"category": "external",
"summary": "449345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0789.json"
}
],
"title": "Red Hat Security Advisory: dnsmasq security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:42+00:00",
"generator": {
"date": "2025-11-21T17:33:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0789",
"initial_release_date": "2008-08-11T17:02:00+00:00",
"revision_history": [
{
"date": "2008-08-11T17:02:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-08-11T13:02:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.src",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.src",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.i386",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.i386",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.i386"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.ia64"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.ppc"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.s390x"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.src"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.i386"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.ia64"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.ppc"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.s390x"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.src"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Dan Kaminsky"
]
}
],
"cve": "CVE-2008-1447",
"discovery_date": "2008-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "449345"
}
],
"notes": [
{
"category": "description",
"text": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bind: implement source UDP port randomization (CERT VU#800113)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:dnsmasq-0:2.45-1.el5_2.1.i386",
"5Client:dnsmasq-0:2.45-1.el5_2.1.ia64",
"5Client:dnsmasq-0:2.45-1.el5_2.1.ppc",
"5Client:dnsmasq-0:2.45-1.el5_2.1.s390x",
"5Client:dnsmasq-0:2.45-1.el5_2.1.src",
"5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"5Server:dnsmasq-0:2.45-1.el5_2.1.i386",
"5Server:dnsmasq-0:2.45-1.el5_2.1.ia64",
"5Server:dnsmasq-0:2.45-1.el5_2.1.ppc",
"5Server:dnsmasq-0:2.45-1.el5_2.1.s390x",
"5Server:dnsmasq-0:2.45-1.el5_2.1.src",
"5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1447"
},
{
"category": "external",
"summary": "RHBZ#449345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447"
}
],
"release_date": "2008-07-08T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-08-11T17:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:dnsmasq-0:2.45-1.el5_2.1.i386",
"5Client:dnsmasq-0:2.45-1.el5_2.1.ia64",
"5Client:dnsmasq-0:2.45-1.el5_2.1.ppc",
"5Client:dnsmasq-0:2.45-1.el5_2.1.s390x",
"5Client:dnsmasq-0:2.45-1.el5_2.1.src",
"5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"5Server:dnsmasq-0:2.45-1.el5_2.1.i386",
"5Server:dnsmasq-0:2.45-1.el5_2.1.ia64",
"5Server:dnsmasq-0:2.45-1.el5_2.1.ppc",
"5Server:dnsmasq-0:2.45-1.el5_2.1.s390x",
"5Server:dnsmasq-0:2.45-1.el5_2.1.src",
"5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0789"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bind: implement source UDP port randomization (CERT VU#800113)"
}
]
}
RHSA-2008_0789
Vulnerability from csaf_redhat - Published: 2008-08-11 17:02 - Updated: 2024-11-22 02:04The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2008:0789 | self |
| https://access.redhat.com/security/updates/classi… | external |
| http://www.thekelleys.org.uk/dnsmasq/CHANGELOG | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=449345 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2008-1447 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=449345 | external |
| https://www.cve.org/CVERecord?id=CVE-2008-1447 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2008-1447 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated dnsmasq package that implements UDP source-port randomization\nis now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Dnsmasq is lightweight DNS forwarder and DHCP server. It is designed to\nprovide DNS and, optionally, DHCP, to a small network.\n\nThe dnsmasq DNS resolver used a fixed source UDP port. This could have made\nDNS spoofing attacks easier. dnsmasq has been updated to use random UDP\nsource ports, helping to make DNS spoofing attacks harder. (CVE-2008-1447)\n\nAll dnsmasq users are advised to upgrade to this updated package, that\nupgrades dnsmasq to version 2.45, which resolves this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0789",
"url": "https://access.redhat.com/errata/RHSA-2008:0789"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG",
"url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG"
},
{
"category": "external",
"summary": "449345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0789.json"
}
],
"title": "Red Hat Security Advisory: dnsmasq security update",
"tracking": {
"current_release_date": "2024-11-22T02:04:18+00:00",
"generator": {
"date": "2024-11-22T02:04:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0789",
"initial_release_date": "2008-08-11T17:02:00+00:00",
"revision_history": [
{
"date": "2008-08-11T17:02:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-08-11T13:02:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:04:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.src",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.src",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.i386",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.i386",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"product": {
"name": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"product_id": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq@2.45-1.el5_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"product": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"product_id": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.45-1.el5_2.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.i386"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.ia64"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.ppc"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.s390x"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.src"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.i386"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.ia64"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.ppc"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.s390x"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.src"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64"
},
"product_reference": "dnsmasq-0:2.45-1.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64"
},
"product_reference": "dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Dan Kaminsky"
]
}
],
"cve": "CVE-2008-1447",
"discovery_date": "2008-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "449345"
}
],
"notes": [
{
"category": "description",
"text": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bind: implement source UDP port randomization (CERT VU#800113)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:dnsmasq-0:2.45-1.el5_2.1.i386",
"5Client:dnsmasq-0:2.45-1.el5_2.1.ia64",
"5Client:dnsmasq-0:2.45-1.el5_2.1.ppc",
"5Client:dnsmasq-0:2.45-1.el5_2.1.s390x",
"5Client:dnsmasq-0:2.45-1.el5_2.1.src",
"5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"5Server:dnsmasq-0:2.45-1.el5_2.1.i386",
"5Server:dnsmasq-0:2.45-1.el5_2.1.ia64",
"5Server:dnsmasq-0:2.45-1.el5_2.1.ppc",
"5Server:dnsmasq-0:2.45-1.el5_2.1.s390x",
"5Server:dnsmasq-0:2.45-1.el5_2.1.src",
"5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1447"
},
{
"category": "external",
"summary": "RHBZ#449345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447"
}
],
"release_date": "2008-07-08T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-08-11T17:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:dnsmasq-0:2.45-1.el5_2.1.i386",
"5Client:dnsmasq-0:2.45-1.el5_2.1.ia64",
"5Client:dnsmasq-0:2.45-1.el5_2.1.ppc",
"5Client:dnsmasq-0:2.45-1.el5_2.1.s390x",
"5Client:dnsmasq-0:2.45-1.el5_2.1.src",
"5Client:dnsmasq-0:2.45-1.el5_2.1.x86_64",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"5Client:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64",
"5Server:dnsmasq-0:2.45-1.el5_2.1.i386",
"5Server:dnsmasq-0:2.45-1.el5_2.1.ia64",
"5Server:dnsmasq-0:2.45-1.el5_2.1.ppc",
"5Server:dnsmasq-0:2.45-1.el5_2.1.s390x",
"5Server:dnsmasq-0:2.45-1.el5_2.1.src",
"5Server:dnsmasq-0:2.45-1.el5_2.1.x86_64",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.i386",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ia64",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.ppc",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.s390x",
"5Server:dnsmasq-debuginfo-0:2.45-1.el5_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0789"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bind: implement source UDP port randomization (CERT VU#800113)"
}
]
}
RHSA-2008:0533
Vulnerability from csaf_redhat - Published: 2008-07-08 18:12 - Updated: 2025-11-21 17:33The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 2.1AS:bind-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-0:9.2.1-10.el2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-devel-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-devel-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-utils-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-utils-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-0:9.2.1-10.el2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-devel-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-devel-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-utils-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-utils-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-0:9.2.1-10.el2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-devel-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-devel-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-utils-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-utils-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-0:9.2.1-10.el2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-devel-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-devel-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-utils-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-utils-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-0:2.4.6-137.1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-0:2.4.6-137.1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2008:0533 | self |
| https://access.redhat.com/security/updates/classi… | external |
| http://www.kb.cert.org/vuls/id/800113 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=449345 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=454852 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2008-1447 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=449345 | external |
| https://www.cve.org/CVERecord?id=CVE-2008-1447 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2008-1447 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated bind packages that help mitigate DNS spoofing attacks are now\navailable. \n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.\n\n[Updated 10th July 2008]\nWe have updated the Enterprise Linux 5 packages in this advisory. The\ndefault and sample caching-nameserver configuration files have been updated\nso that they do not specify a fixed query-source port. Administrators\nwishing to take advantage of randomized UDP source ports should check their\nconfiguration file to ensure they have not specified fixed query-source ports.",
"title": "Topic"
},
{
"category": "general",
"text": "ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS\n(Domain Name System) protocols.\n\nThe DNS protocol protects against spoofing attacks by requiring an attacker\nto predict both the DNS transaction ID and UDP source port of a request. In\nrecent years, a number of papers have found problems with DNS\nimplementations which make it easier for an attacker to perform DNS\ncache-poisoning attacks.\n\nPrevious versions of BIND did not use randomized UDP source ports. If an\nattacker was able to predict the random DNS transaction ID, this could make\nDNS cache-poisoning attacks easier. In order to provide more resilience,\nBIND has been updated to use a range of random UDP source ports.\n(CVE-2008-1447)\n\nNote: This errata also updates SELinux policy on Red Hat Enterprise Linux 4\nand 5 to allow BIND to use random UDP source ports.\n\nUsers of BIND are advised to upgrade to these updated packages, which\ncontain a backported patch to add this functionality.\n\nRed Hat would like to thank Dan Kaminsky for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0533",
"url": "https://access.redhat.com/errata/RHSA-2008:0533"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.kb.cert.org/vuls/id/800113",
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"category": "external",
"summary": "449345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
},
{
"category": "external",
"summary": "454852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=454852"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0533.json"
}
],
"title": "Red Hat Security Advisory: bind security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:25+00:00",
"generator": {
"date": "2025-11-21T17:33:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0533",
"initial_release_date": "2008-07-08T18:12:00+00:00",
"revision_history": [
{
"date": "2008-07-08T18:12:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-07-10T15:53:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-0:9.2.1-10.el2.ia64",
"product": {
"name": "bind-0:9.2.1-10.el2.ia64",
"product_id": "bind-0:9.2.1-10.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.1-10.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bind-devel-0:9.2.1-10.el2.ia64",
"product": {
"name": "bind-devel-0:9.2.1-10.el2.ia64",
"product_id": "bind-devel-0:9.2.1-10.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.1-10.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bind-utils-0:9.2.1-10.el2.ia64",
"product": {
"name": "bind-utils-0:9.2.1-10.el2.ia64",
"product_id": "bind-utils-0:9.2.1-10.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.1-10.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64",
"product_id": "bind-chroot-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.ia64",
"product_id": "bind-utils-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.ia64",
"product_id": "bind-libs-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-20:9.2.4-22.el3.ia64",
"product_id": "bind-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.ia64",
"product_id": "bind-devel-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-0:9.2.1-10.el2.src",
"product": {
"name": "bind-0:9.2.1-10.el2.src",
"product_id": "bind-0:9.2.1-10.el2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.1-10.el2?arch=src"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.src",
"product": {
"name": "bind-20:9.2.4-22.el3.src",
"product_id": "bind-20:9.2.4-22.el3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=src\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.src",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.src",
"product_id": "bind-20:9.2.4-28.0.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=src\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"product": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"product_id": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-targeted@1.17.30-2.150.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"product": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"product_id": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy@2.4.6-137.1.el5_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=src\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-0:9.2.1-10.el2.i386",
"product": {
"name": "bind-0:9.2.1-10.el2.i386",
"product_id": "bind-0:9.2.1-10.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.1-10.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bind-devel-0:9.2.1-10.el2.i386",
"product": {
"name": "bind-devel-0:9.2.1-10.el2.i386",
"product_id": "bind-devel-0:9.2.1-10.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.1-10.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bind-utils-0:9.2.1-10.el2.i386",
"product": {
"name": "bind-utils-0:9.2.1-10.el2.i386",
"product_id": "bind-utils-0:9.2.1-10.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.1-10.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.i386",
"product_id": "bind-chroot-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.i386",
"product_id": "bind-utils-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.i386",
"product_id": "bind-libs-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-20:9.2.4-22.el3.i386",
"product_id": "bind-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.i386",
"product_id": "bind-devel-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64",
"product_id": "bind-chroot-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64",
"product_id": "bind-utils-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64",
"product_id": "bind-libs-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-20:9.2.4-22.el3.x86_64",
"product_id": "bind-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64",
"product_id": "bind-devel-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc",
"product_id": "bind-chroot-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.ppc",
"product_id": "bind-utils-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.ppc",
"product_id": "bind-libs-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-20:9.2.4-22.el3.ppc",
"product_id": "bind-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.ppc",
"product_id": "bind-devel-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x",
"product_id": "bind-chroot-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.s390x",
"product_id": "bind-utils-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.s390x",
"product_id": "bind-libs-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-20:9.2.4-22.el3.s390x",
"product_id": "bind-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.s390x",
"product_id": "bind-devel-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.s390",
"product_id": "bind-chroot-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.s390",
"product_id": "bind-utils-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.s390",
"product_id": "bind-libs-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-20:9.2.4-22.el3.s390",
"product_id": "bind-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.s390",
"product_id": "bind-devel-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=s390\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=s390\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=s390\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=s390\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=ppc64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=ppc64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=ppc64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=ppc64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=ppc64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=ppc64\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"product": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"product_id": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-targeted-sources@1.17.30-2.150.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"product": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"product_id": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-targeted@1.17.30-2.150.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-devel@2.4.6-137.1.el5_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-strict@2.4.6-137.1.el5_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy@2.4.6-137.1.el5_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-targeted@2.4.6-137.1.el5_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-mls@2.4.6-137.1.el5_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-0:9.2.1-10.el2.src"
},
"product_reference": "bind-0:9.2.1-10.el2.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-devel-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-devel-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-utils-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-utils-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.src as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-0:9.2.1-10.el2.src"
},
"product_reference": "bind-0:9.2.1-10.el2.src",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-devel-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-devel-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-utils-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-utils-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-0:9.2.1-10.el2.src"
},
"product_reference": "bind-0:9.2.1-10.el2.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-devel-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-devel-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-utils-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-utils-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-0:9.2.1-10.el2.src"
},
"product_reference": "bind-0:9.2.1-10.el2.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-devel-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-devel-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-utils-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-utils-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.src"
},
"product_reference": "bind-20:9.2.4-22.el3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.src"
},
"product_reference": "bind-20:9.2.4-22.el3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.src"
},
"product_reference": "bind-20:9.2.4-22.el3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.src"
},
"product_reference": "bind-20:9.2.4-22.el3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.src"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.src"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.src"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.src"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.src"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.src"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.src"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.src"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.src"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.src"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-0:2.4.6-137.1.el5_2.src"
},
"product_reference": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.src"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-0:2.4.6-137.1.el5_2.src"
},
"product_reference": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Dan Kaminsky"
]
}
],
"cve": "CVE-2008-1447",
"discovery_date": "2008-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "449345"
}
],
"notes": [
{
"category": "description",
"text": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bind: implement source UDP port randomization (CERT VU#800113)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:bind-0:9.2.1-10.el2.i386",
"2.1AS:bind-0:9.2.1-10.el2.ia64",
"2.1AS:bind-0:9.2.1-10.el2.src",
"2.1AS:bind-devel-0:9.2.1-10.el2.i386",
"2.1AS:bind-devel-0:9.2.1-10.el2.ia64",
"2.1AS:bind-utils-0:9.2.1-10.el2.i386",
"2.1AS:bind-utils-0:9.2.1-10.el2.ia64",
"2.1AW:bind-0:9.2.1-10.el2.i386",
"2.1AW:bind-0:9.2.1-10.el2.ia64",
"2.1AW:bind-0:9.2.1-10.el2.src",
"2.1AW:bind-devel-0:9.2.1-10.el2.i386",
"2.1AW:bind-devel-0:9.2.1-10.el2.ia64",
"2.1AW:bind-utils-0:9.2.1-10.el2.i386",
"2.1AW:bind-utils-0:9.2.1-10.el2.ia64",
"2.1ES:bind-0:9.2.1-10.el2.i386",
"2.1ES:bind-0:9.2.1-10.el2.ia64",
"2.1ES:bind-0:9.2.1-10.el2.src",
"2.1ES:bind-devel-0:9.2.1-10.el2.i386",
"2.1ES:bind-devel-0:9.2.1-10.el2.ia64",
"2.1ES:bind-utils-0:9.2.1-10.el2.i386",
"2.1ES:bind-utils-0:9.2.1-10.el2.ia64",
"2.1WS:bind-0:9.2.1-10.el2.i386",
"2.1WS:bind-0:9.2.1-10.el2.ia64",
"2.1WS:bind-0:9.2.1-10.el2.src",
"2.1WS:bind-devel-0:9.2.1-10.el2.i386",
"2.1WS:bind-devel-0:9.2.1-10.el2.ia64",
"2.1WS:bind-utils-0:9.2.1-10.el2.i386",
"2.1WS:bind-utils-0:9.2.1-10.el2.ia64",
"3AS:bind-20:9.2.4-22.el3.i386",
"3AS:bind-20:9.2.4-22.el3.ia64",
"3AS:bind-20:9.2.4-22.el3.ppc",
"3AS:bind-20:9.2.4-22.el3.s390",
"3AS:bind-20:9.2.4-22.el3.s390x",
"3AS:bind-20:9.2.4-22.el3.src",
"3AS:bind-20:9.2.4-22.el3.x86_64",
"3AS:bind-chroot-20:9.2.4-22.el3.i386",
"3AS:bind-chroot-20:9.2.4-22.el3.ia64",
"3AS:bind-chroot-20:9.2.4-22.el3.ppc",
"3AS:bind-chroot-20:9.2.4-22.el3.s390",
"3AS:bind-chroot-20:9.2.4-22.el3.s390x",
"3AS:bind-chroot-20:9.2.4-22.el3.x86_64",
"3AS:bind-debuginfo-20:9.2.4-22.el3.i386",
"3AS:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3AS:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3AS:bind-debuginfo-20:9.2.4-22.el3.s390",
"3AS:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3AS:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3AS:bind-devel-20:9.2.4-22.el3.i386",
"3AS:bind-devel-20:9.2.4-22.el3.ia64",
"3AS:bind-devel-20:9.2.4-22.el3.ppc",
"3AS:bind-devel-20:9.2.4-22.el3.s390",
"3AS:bind-devel-20:9.2.4-22.el3.s390x",
"3AS:bind-devel-20:9.2.4-22.el3.x86_64",
"3AS:bind-libs-20:9.2.4-22.el3.i386",
"3AS:bind-libs-20:9.2.4-22.el3.ia64",
"3AS:bind-libs-20:9.2.4-22.el3.ppc",
"3AS:bind-libs-20:9.2.4-22.el3.s390",
"3AS:bind-libs-20:9.2.4-22.el3.s390x",
"3AS:bind-libs-20:9.2.4-22.el3.x86_64",
"3AS:bind-utils-20:9.2.4-22.el3.i386",
"3AS:bind-utils-20:9.2.4-22.el3.ia64",
"3AS:bind-utils-20:9.2.4-22.el3.ppc",
"3AS:bind-utils-20:9.2.4-22.el3.s390",
"3AS:bind-utils-20:9.2.4-22.el3.s390x",
"3AS:bind-utils-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-20:9.2.4-22.el3.i386",
"3Desktop:bind-20:9.2.4-22.el3.ia64",
"3Desktop:bind-20:9.2.4-22.el3.ppc",
"3Desktop:bind-20:9.2.4-22.el3.s390",
"3Desktop:bind-20:9.2.4-22.el3.s390x",
"3Desktop:bind-20:9.2.4-22.el3.src",
"3Desktop:bind-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-chroot-20:9.2.4-22.el3.i386",
"3Desktop:bind-chroot-20:9.2.4-22.el3.ia64",
"3Desktop:bind-chroot-20:9.2.4-22.el3.ppc",
"3Desktop:bind-chroot-20:9.2.4-22.el3.s390",
"3Desktop:bind-chroot-20:9.2.4-22.el3.s390x",
"3Desktop:bind-chroot-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.i386",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-devel-20:9.2.4-22.el3.i386",
"3Desktop:bind-devel-20:9.2.4-22.el3.ia64",
"3Desktop:bind-devel-20:9.2.4-22.el3.ppc",
"3Desktop:bind-devel-20:9.2.4-22.el3.s390",
"3Desktop:bind-devel-20:9.2.4-22.el3.s390x",
"3Desktop:bind-devel-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-libs-20:9.2.4-22.el3.i386",
"3Desktop:bind-libs-20:9.2.4-22.el3.ia64",
"3Desktop:bind-libs-20:9.2.4-22.el3.ppc",
"3Desktop:bind-libs-20:9.2.4-22.el3.s390",
"3Desktop:bind-libs-20:9.2.4-22.el3.s390x",
"3Desktop:bind-libs-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-utils-20:9.2.4-22.el3.i386",
"3Desktop:bind-utils-20:9.2.4-22.el3.ia64",
"3Desktop:bind-utils-20:9.2.4-22.el3.ppc",
"3Desktop:bind-utils-20:9.2.4-22.el3.s390",
"3Desktop:bind-utils-20:9.2.4-22.el3.s390x",
"3Desktop:bind-utils-20:9.2.4-22.el3.x86_64",
"3ES:bind-20:9.2.4-22.el3.i386",
"3ES:bind-20:9.2.4-22.el3.ia64",
"3ES:bind-20:9.2.4-22.el3.ppc",
"3ES:bind-20:9.2.4-22.el3.s390",
"3ES:bind-20:9.2.4-22.el3.s390x",
"3ES:bind-20:9.2.4-22.el3.src",
"3ES:bind-20:9.2.4-22.el3.x86_64",
"3ES:bind-chroot-20:9.2.4-22.el3.i386",
"3ES:bind-chroot-20:9.2.4-22.el3.ia64",
"3ES:bind-chroot-20:9.2.4-22.el3.ppc",
"3ES:bind-chroot-20:9.2.4-22.el3.s390",
"3ES:bind-chroot-20:9.2.4-22.el3.s390x",
"3ES:bind-chroot-20:9.2.4-22.el3.x86_64",
"3ES:bind-debuginfo-20:9.2.4-22.el3.i386",
"3ES:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3ES:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3ES:bind-debuginfo-20:9.2.4-22.el3.s390",
"3ES:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3ES:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3ES:bind-devel-20:9.2.4-22.el3.i386",
"3ES:bind-devel-20:9.2.4-22.el3.ia64",
"3ES:bind-devel-20:9.2.4-22.el3.ppc",
"3ES:bind-devel-20:9.2.4-22.el3.s390",
"3ES:bind-devel-20:9.2.4-22.el3.s390x",
"3ES:bind-devel-20:9.2.4-22.el3.x86_64",
"3ES:bind-libs-20:9.2.4-22.el3.i386",
"3ES:bind-libs-20:9.2.4-22.el3.ia64",
"3ES:bind-libs-20:9.2.4-22.el3.ppc",
"3ES:bind-libs-20:9.2.4-22.el3.s390",
"3ES:bind-libs-20:9.2.4-22.el3.s390x",
"3ES:bind-libs-20:9.2.4-22.el3.x86_64",
"3ES:bind-utils-20:9.2.4-22.el3.i386",
"3ES:bind-utils-20:9.2.4-22.el3.ia64",
"3ES:bind-utils-20:9.2.4-22.el3.ppc",
"3ES:bind-utils-20:9.2.4-22.el3.s390",
"3ES:bind-utils-20:9.2.4-22.el3.s390x",
"3ES:bind-utils-20:9.2.4-22.el3.x86_64",
"3WS:bind-20:9.2.4-22.el3.i386",
"3WS:bind-20:9.2.4-22.el3.ia64",
"3WS:bind-20:9.2.4-22.el3.ppc",
"3WS:bind-20:9.2.4-22.el3.s390",
"3WS:bind-20:9.2.4-22.el3.s390x",
"3WS:bind-20:9.2.4-22.el3.src",
"3WS:bind-20:9.2.4-22.el3.x86_64",
"3WS:bind-chroot-20:9.2.4-22.el3.i386",
"3WS:bind-chroot-20:9.2.4-22.el3.ia64",
"3WS:bind-chroot-20:9.2.4-22.el3.ppc",
"3WS:bind-chroot-20:9.2.4-22.el3.s390",
"3WS:bind-chroot-20:9.2.4-22.el3.s390x",
"3WS:bind-chroot-20:9.2.4-22.el3.x86_64",
"3WS:bind-debuginfo-20:9.2.4-22.el3.i386",
"3WS:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3WS:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3WS:bind-debuginfo-20:9.2.4-22.el3.s390",
"3WS:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3WS:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3WS:bind-devel-20:9.2.4-22.el3.i386",
"3WS:bind-devel-20:9.2.4-22.el3.ia64",
"3WS:bind-devel-20:9.2.4-22.el3.ppc",
"3WS:bind-devel-20:9.2.4-22.el3.s390",
"3WS:bind-devel-20:9.2.4-22.el3.s390x",
"3WS:bind-devel-20:9.2.4-22.el3.x86_64",
"3WS:bind-libs-20:9.2.4-22.el3.i386",
"3WS:bind-libs-20:9.2.4-22.el3.ia64",
"3WS:bind-libs-20:9.2.4-22.el3.ppc",
"3WS:bind-libs-20:9.2.4-22.el3.s390",
"3WS:bind-libs-20:9.2.4-22.el3.s390x",
"3WS:bind-libs-20:9.2.4-22.el3.x86_64",
"3WS:bind-utils-20:9.2.4-22.el3.i386",
"3WS:bind-utils-20:9.2.4-22.el3.ia64",
"3WS:bind-utils-20:9.2.4-22.el3.ppc",
"3WS:bind-utils-20:9.2.4-22.el3.s390",
"3WS:bind-utils-20:9.2.4-22.el3.s390x",
"3WS:bind-utils-20:9.2.4-22.el3.x86_64",
"4AS:bind-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-20:9.2.4-28.0.1.el4.src",
"4AS:bind-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4AS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4Desktop:bind-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-20:9.2.4-28.0.1.el4.src",
"4Desktop:bind-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4Desktop:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4ES:bind-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-20:9.2.4-28.0.1.el4.src",
"4ES:bind-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4ES:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4WS:bind-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-20:9.2.4-28.0.1.el4.src",
"4WS:bind-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4WS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-0:2.4.6-137.1.el5_2.src",
"5Client:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-0:2.4.6-137.1.el5_2.src",
"5Server:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1447"
},
{
"category": "external",
"summary": "RHBZ#449345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447"
}
],
"release_date": "2008-07-08T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-07-08T18:12:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:bind-0:9.2.1-10.el2.i386",
"2.1AS:bind-0:9.2.1-10.el2.ia64",
"2.1AS:bind-0:9.2.1-10.el2.src",
"2.1AS:bind-devel-0:9.2.1-10.el2.i386",
"2.1AS:bind-devel-0:9.2.1-10.el2.ia64",
"2.1AS:bind-utils-0:9.2.1-10.el2.i386",
"2.1AS:bind-utils-0:9.2.1-10.el2.ia64",
"2.1AW:bind-0:9.2.1-10.el2.i386",
"2.1AW:bind-0:9.2.1-10.el2.ia64",
"2.1AW:bind-0:9.2.1-10.el2.src",
"2.1AW:bind-devel-0:9.2.1-10.el2.i386",
"2.1AW:bind-devel-0:9.2.1-10.el2.ia64",
"2.1AW:bind-utils-0:9.2.1-10.el2.i386",
"2.1AW:bind-utils-0:9.2.1-10.el2.ia64",
"2.1ES:bind-0:9.2.1-10.el2.i386",
"2.1ES:bind-0:9.2.1-10.el2.ia64",
"2.1ES:bind-0:9.2.1-10.el2.src",
"2.1ES:bind-devel-0:9.2.1-10.el2.i386",
"2.1ES:bind-devel-0:9.2.1-10.el2.ia64",
"2.1ES:bind-utils-0:9.2.1-10.el2.i386",
"2.1ES:bind-utils-0:9.2.1-10.el2.ia64",
"2.1WS:bind-0:9.2.1-10.el2.i386",
"2.1WS:bind-0:9.2.1-10.el2.ia64",
"2.1WS:bind-0:9.2.1-10.el2.src",
"2.1WS:bind-devel-0:9.2.1-10.el2.i386",
"2.1WS:bind-devel-0:9.2.1-10.el2.ia64",
"2.1WS:bind-utils-0:9.2.1-10.el2.i386",
"2.1WS:bind-utils-0:9.2.1-10.el2.ia64",
"3AS:bind-20:9.2.4-22.el3.i386",
"3AS:bind-20:9.2.4-22.el3.ia64",
"3AS:bind-20:9.2.4-22.el3.ppc",
"3AS:bind-20:9.2.4-22.el3.s390",
"3AS:bind-20:9.2.4-22.el3.s390x",
"3AS:bind-20:9.2.4-22.el3.src",
"3AS:bind-20:9.2.4-22.el3.x86_64",
"3AS:bind-chroot-20:9.2.4-22.el3.i386",
"3AS:bind-chroot-20:9.2.4-22.el3.ia64",
"3AS:bind-chroot-20:9.2.4-22.el3.ppc",
"3AS:bind-chroot-20:9.2.4-22.el3.s390",
"3AS:bind-chroot-20:9.2.4-22.el3.s390x",
"3AS:bind-chroot-20:9.2.4-22.el3.x86_64",
"3AS:bind-debuginfo-20:9.2.4-22.el3.i386",
"3AS:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3AS:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3AS:bind-debuginfo-20:9.2.4-22.el3.s390",
"3AS:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3AS:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3AS:bind-devel-20:9.2.4-22.el3.i386",
"3AS:bind-devel-20:9.2.4-22.el3.ia64",
"3AS:bind-devel-20:9.2.4-22.el3.ppc",
"3AS:bind-devel-20:9.2.4-22.el3.s390",
"3AS:bind-devel-20:9.2.4-22.el3.s390x",
"3AS:bind-devel-20:9.2.4-22.el3.x86_64",
"3AS:bind-libs-20:9.2.4-22.el3.i386",
"3AS:bind-libs-20:9.2.4-22.el3.ia64",
"3AS:bind-libs-20:9.2.4-22.el3.ppc",
"3AS:bind-libs-20:9.2.4-22.el3.s390",
"3AS:bind-libs-20:9.2.4-22.el3.s390x",
"3AS:bind-libs-20:9.2.4-22.el3.x86_64",
"3AS:bind-utils-20:9.2.4-22.el3.i386",
"3AS:bind-utils-20:9.2.4-22.el3.ia64",
"3AS:bind-utils-20:9.2.4-22.el3.ppc",
"3AS:bind-utils-20:9.2.4-22.el3.s390",
"3AS:bind-utils-20:9.2.4-22.el3.s390x",
"3AS:bind-utils-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-20:9.2.4-22.el3.i386",
"3Desktop:bind-20:9.2.4-22.el3.ia64",
"3Desktop:bind-20:9.2.4-22.el3.ppc",
"3Desktop:bind-20:9.2.4-22.el3.s390",
"3Desktop:bind-20:9.2.4-22.el3.s390x",
"3Desktop:bind-20:9.2.4-22.el3.src",
"3Desktop:bind-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-chroot-20:9.2.4-22.el3.i386",
"3Desktop:bind-chroot-20:9.2.4-22.el3.ia64",
"3Desktop:bind-chroot-20:9.2.4-22.el3.ppc",
"3Desktop:bind-chroot-20:9.2.4-22.el3.s390",
"3Desktop:bind-chroot-20:9.2.4-22.el3.s390x",
"3Desktop:bind-chroot-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.i386",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-devel-20:9.2.4-22.el3.i386",
"3Desktop:bind-devel-20:9.2.4-22.el3.ia64",
"3Desktop:bind-devel-20:9.2.4-22.el3.ppc",
"3Desktop:bind-devel-20:9.2.4-22.el3.s390",
"3Desktop:bind-devel-20:9.2.4-22.el3.s390x",
"3Desktop:bind-devel-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-libs-20:9.2.4-22.el3.i386",
"3Desktop:bind-libs-20:9.2.4-22.el3.ia64",
"3Desktop:bind-libs-20:9.2.4-22.el3.ppc",
"3Desktop:bind-libs-20:9.2.4-22.el3.s390",
"3Desktop:bind-libs-20:9.2.4-22.el3.s390x",
"3Desktop:bind-libs-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-utils-20:9.2.4-22.el3.i386",
"3Desktop:bind-utils-20:9.2.4-22.el3.ia64",
"3Desktop:bind-utils-20:9.2.4-22.el3.ppc",
"3Desktop:bind-utils-20:9.2.4-22.el3.s390",
"3Desktop:bind-utils-20:9.2.4-22.el3.s390x",
"3Desktop:bind-utils-20:9.2.4-22.el3.x86_64",
"3ES:bind-20:9.2.4-22.el3.i386",
"3ES:bind-20:9.2.4-22.el3.ia64",
"3ES:bind-20:9.2.4-22.el3.ppc",
"3ES:bind-20:9.2.4-22.el3.s390",
"3ES:bind-20:9.2.4-22.el3.s390x",
"3ES:bind-20:9.2.4-22.el3.src",
"3ES:bind-20:9.2.4-22.el3.x86_64",
"3ES:bind-chroot-20:9.2.4-22.el3.i386",
"3ES:bind-chroot-20:9.2.4-22.el3.ia64",
"3ES:bind-chroot-20:9.2.4-22.el3.ppc",
"3ES:bind-chroot-20:9.2.4-22.el3.s390",
"3ES:bind-chroot-20:9.2.4-22.el3.s390x",
"3ES:bind-chroot-20:9.2.4-22.el3.x86_64",
"3ES:bind-debuginfo-20:9.2.4-22.el3.i386",
"3ES:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3ES:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3ES:bind-debuginfo-20:9.2.4-22.el3.s390",
"3ES:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3ES:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3ES:bind-devel-20:9.2.4-22.el3.i386",
"3ES:bind-devel-20:9.2.4-22.el3.ia64",
"3ES:bind-devel-20:9.2.4-22.el3.ppc",
"3ES:bind-devel-20:9.2.4-22.el3.s390",
"3ES:bind-devel-20:9.2.4-22.el3.s390x",
"3ES:bind-devel-20:9.2.4-22.el3.x86_64",
"3ES:bind-libs-20:9.2.4-22.el3.i386",
"3ES:bind-libs-20:9.2.4-22.el3.ia64",
"3ES:bind-libs-20:9.2.4-22.el3.ppc",
"3ES:bind-libs-20:9.2.4-22.el3.s390",
"3ES:bind-libs-20:9.2.4-22.el3.s390x",
"3ES:bind-libs-20:9.2.4-22.el3.x86_64",
"3ES:bind-utils-20:9.2.4-22.el3.i386",
"3ES:bind-utils-20:9.2.4-22.el3.ia64",
"3ES:bind-utils-20:9.2.4-22.el3.ppc",
"3ES:bind-utils-20:9.2.4-22.el3.s390",
"3ES:bind-utils-20:9.2.4-22.el3.s390x",
"3ES:bind-utils-20:9.2.4-22.el3.x86_64",
"3WS:bind-20:9.2.4-22.el3.i386",
"3WS:bind-20:9.2.4-22.el3.ia64",
"3WS:bind-20:9.2.4-22.el3.ppc",
"3WS:bind-20:9.2.4-22.el3.s390",
"3WS:bind-20:9.2.4-22.el3.s390x",
"3WS:bind-20:9.2.4-22.el3.src",
"3WS:bind-20:9.2.4-22.el3.x86_64",
"3WS:bind-chroot-20:9.2.4-22.el3.i386",
"3WS:bind-chroot-20:9.2.4-22.el3.ia64",
"3WS:bind-chroot-20:9.2.4-22.el3.ppc",
"3WS:bind-chroot-20:9.2.4-22.el3.s390",
"3WS:bind-chroot-20:9.2.4-22.el3.s390x",
"3WS:bind-chroot-20:9.2.4-22.el3.x86_64",
"3WS:bind-debuginfo-20:9.2.4-22.el3.i386",
"3WS:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3WS:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3WS:bind-debuginfo-20:9.2.4-22.el3.s390",
"3WS:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3WS:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3WS:bind-devel-20:9.2.4-22.el3.i386",
"3WS:bind-devel-20:9.2.4-22.el3.ia64",
"3WS:bind-devel-20:9.2.4-22.el3.ppc",
"3WS:bind-devel-20:9.2.4-22.el3.s390",
"3WS:bind-devel-20:9.2.4-22.el3.s390x",
"3WS:bind-devel-20:9.2.4-22.el3.x86_64",
"3WS:bind-libs-20:9.2.4-22.el3.i386",
"3WS:bind-libs-20:9.2.4-22.el3.ia64",
"3WS:bind-libs-20:9.2.4-22.el3.ppc",
"3WS:bind-libs-20:9.2.4-22.el3.s390",
"3WS:bind-libs-20:9.2.4-22.el3.s390x",
"3WS:bind-libs-20:9.2.4-22.el3.x86_64",
"3WS:bind-utils-20:9.2.4-22.el3.i386",
"3WS:bind-utils-20:9.2.4-22.el3.ia64",
"3WS:bind-utils-20:9.2.4-22.el3.ppc",
"3WS:bind-utils-20:9.2.4-22.el3.s390",
"3WS:bind-utils-20:9.2.4-22.el3.s390x",
"3WS:bind-utils-20:9.2.4-22.el3.x86_64",
"4AS:bind-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-20:9.2.4-28.0.1.el4.src",
"4AS:bind-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4AS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4Desktop:bind-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-20:9.2.4-28.0.1.el4.src",
"4Desktop:bind-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4Desktop:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4ES:bind-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-20:9.2.4-28.0.1.el4.src",
"4ES:bind-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4ES:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4WS:bind-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-20:9.2.4-28.0.1.el4.src",
"4WS:bind-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4WS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-0:2.4.6-137.1.el5_2.src",
"5Client:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-0:2.4.6-137.1.el5_2.src",
"5Server:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0533"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bind: implement source UDP port randomization (CERT VU#800113)"
}
]
}
RHSA-2008_0533
Vulnerability from csaf_redhat - Published: 2008-07-08 18:12 - Updated: 2024-11-22 02:04The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 2.1AS:bind-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-0:9.2.1-10.el2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-devel-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-devel-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-utils-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AS:bind-utils-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-0:9.2.1-10.el2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-devel-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-devel-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-utils-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1AW:bind-utils-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-0:9.2.1-10.el2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-devel-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-devel-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-utils-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1ES:bind-utils-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-0:9.2.1-10.el2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-devel-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-devel-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-utils-0:9.2.1-10.el2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 2.1WS:bind-utils-0:9.2.1-10.el2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-chroot-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-debuginfo-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-devel-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-libs-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3AS:bind-utils-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-chroot-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-debuginfo-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-devel-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-libs-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop:bind-utils-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-chroot-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-debuginfo-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-devel-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-libs-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES:bind-utils-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-chroot-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-debuginfo-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-devel-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-libs-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS:bind-utils-20:9.2.4-22.el3.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-devel-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-libs-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:bind-utils-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-devel-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-libs-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:bind-utils-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-chroot-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-devel-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-libs-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:bind-utils-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-devel-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-libs-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:bind-utils-20:9.2.4-28.0.1.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-0:2.4.6-137.1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-0:2.4.6-137.1.el5_2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2008:0533 | self |
| https://access.redhat.com/security/updates/classi… | external |
| http://www.kb.cert.org/vuls/id/800113 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=449345 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=454852 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2008-1447 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=449345 | external |
| https://www.cve.org/CVERecord?id=CVE-2008-1447 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2008-1447 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated bind packages that help mitigate DNS spoofing attacks are now\navailable. \n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.\n\n[Updated 10th July 2008]\nWe have updated the Enterprise Linux 5 packages in this advisory. The\ndefault and sample caching-nameserver configuration files have been updated\nso that they do not specify a fixed query-source port. Administrators\nwishing to take advantage of randomized UDP source ports should check their\nconfiguration file to ensure they have not specified fixed query-source ports.",
"title": "Topic"
},
{
"category": "general",
"text": "ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS\n(Domain Name System) protocols.\n\nThe DNS protocol protects against spoofing attacks by requiring an attacker\nto predict both the DNS transaction ID and UDP source port of a request. In\nrecent years, a number of papers have found problems with DNS\nimplementations which make it easier for an attacker to perform DNS\ncache-poisoning attacks.\n\nPrevious versions of BIND did not use randomized UDP source ports. If an\nattacker was able to predict the random DNS transaction ID, this could make\nDNS cache-poisoning attacks easier. In order to provide more resilience,\nBIND has been updated to use a range of random UDP source ports.\n(CVE-2008-1447)\n\nNote: This errata also updates SELinux policy on Red Hat Enterprise Linux 4\nand 5 to allow BIND to use random UDP source ports.\n\nUsers of BIND are advised to upgrade to these updated packages, which\ncontain a backported patch to add this functionality.\n\nRed Hat would like to thank Dan Kaminsky for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0533",
"url": "https://access.redhat.com/errata/RHSA-2008:0533"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.kb.cert.org/vuls/id/800113",
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"category": "external",
"summary": "449345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
},
{
"category": "external",
"summary": "454852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=454852"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0533.json"
}
],
"title": "Red Hat Security Advisory: bind security update",
"tracking": {
"current_release_date": "2024-11-22T02:04:12+00:00",
"generator": {
"date": "2024-11-22T02:04:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0533",
"initial_release_date": "2008-07-08T18:12:00+00:00",
"revision_history": [
{
"date": "2008-07-08T18:12:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-07-10T15:53:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:04:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-0:9.2.1-10.el2.ia64",
"product": {
"name": "bind-0:9.2.1-10.el2.ia64",
"product_id": "bind-0:9.2.1-10.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.1-10.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bind-devel-0:9.2.1-10.el2.ia64",
"product": {
"name": "bind-devel-0:9.2.1-10.el2.ia64",
"product_id": "bind-devel-0:9.2.1-10.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.1-10.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bind-utils-0:9.2.1-10.el2.ia64",
"product": {
"name": "bind-utils-0:9.2.1-10.el2.ia64",
"product_id": "bind-utils-0:9.2.1-10.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.1-10.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64",
"product_id": "bind-chroot-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.ia64",
"product_id": "bind-utils-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.ia64",
"product_id": "bind-libs-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-20:9.2.4-22.el3.ia64",
"product_id": "bind-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.ia64",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.ia64",
"product_id": "bind-devel-20:9.2.4-22.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=ia64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=ia64\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-0:9.2.1-10.el2.src",
"product": {
"name": "bind-0:9.2.1-10.el2.src",
"product_id": "bind-0:9.2.1-10.el2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.1-10.el2?arch=src"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.src",
"product": {
"name": "bind-20:9.2.4-22.el3.src",
"product_id": "bind-20:9.2.4-22.el3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=src\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.src",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.src",
"product_id": "bind-20:9.2.4-28.0.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=src\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"product": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"product_id": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-targeted@1.17.30-2.150.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"product": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"product_id": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy@2.4.6-137.1.el5_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=src\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-0:9.2.1-10.el2.i386",
"product": {
"name": "bind-0:9.2.1-10.el2.i386",
"product_id": "bind-0:9.2.1-10.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.1-10.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bind-devel-0:9.2.1-10.el2.i386",
"product": {
"name": "bind-devel-0:9.2.1-10.el2.i386",
"product_id": "bind-devel-0:9.2.1-10.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.1-10.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bind-utils-0:9.2.1-10.el2.i386",
"product": {
"name": "bind-utils-0:9.2.1-10.el2.i386",
"product_id": "bind-utils-0:9.2.1-10.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.1-10.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.i386",
"product_id": "bind-chroot-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.i386",
"product_id": "bind-utils-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.i386",
"product_id": "bind-libs-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-20:9.2.4-22.el3.i386",
"product_id": "bind-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.i386",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.i386",
"product_id": "bind-devel-20:9.2.4-22.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.i386",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.i386",
"product_id": "bind-20:9.2.4-28.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=i386\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=i386\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64",
"product_id": "bind-chroot-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64",
"product_id": "bind-utils-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64",
"product_id": "bind-libs-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-20:9.2.4-22.el3.x86_64",
"product_id": "bind-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.x86_64",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64",
"product_id": "bind-devel-20:9.2.4-22.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=x86_64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=x86_64\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc",
"product_id": "bind-chroot-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.ppc",
"product_id": "bind-utils-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.ppc",
"product_id": "bind-libs-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-20:9.2.4-22.el3.ppc",
"product_id": "bind-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.ppc",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.ppc",
"product_id": "bind-devel-20:9.2.4-22.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=ppc\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=ppc\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x",
"product_id": "bind-chroot-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.s390x",
"product_id": "bind-utils-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.s390x",
"product_id": "bind-libs-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-20:9.2.4-22.el3.s390x",
"product_id": "bind-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.s390x",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.s390x",
"product_id": "bind-devel-20:9.2.4-22.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=s390x\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/caching-nameserver@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-sdb@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=s390x\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-chroot-20:9.2.4-22.el3.s390",
"product_id": "bind-chroot-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-utils-20:9.2.4-22.el3.s390",
"product_id": "bind-utils-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390",
"product_id": "bind-debuginfo-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-libs-20:9.2.4-22.el3.s390",
"product_id": "bind-libs-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-20:9.2.4-22.el3.s390",
"product_id": "bind-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-22.el3.s390",
"product": {
"name": "bind-devel-20:9.2.4-22.el3.s390",
"product_id": "bind-devel-20:9.2.4-22.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-22.el3?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-utils@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-chroot@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-20:9.2.4-28.0.1.el4.s390",
"product": {
"name": "bind-20:9.2.4-28.0.1.el4.s390",
"product_id": "bind-20:9.2.4-28.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind@9.2.4-28.0.1.el4?arch=s390\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=s390\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=s390\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=s390\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=s390\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"product": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"product_id": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.2.4-28.0.1.el4?arch=ppc64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"product": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"product_id": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.2.4-28.0.1.el4?arch=ppc64\u0026epoch=20"
}
}
},
{
"category": "product_version",
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_id": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-debuginfo@9.3.4-6.0.2.P1.el5_2?arch=ppc64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_id": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.4-6.0.2.P1.el5_2?arch=ppc64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_id": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-libs@9.3.4-6.0.2.P1.el5_2?arch=ppc64\u0026epoch=30"
}
}
},
{
"category": "product_version",
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_id": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bind-devel@9.3.4-6.0.2.P1.el5_2?arch=ppc64\u0026epoch=30"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"product": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"product_id": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-targeted-sources@1.17.30-2.150.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"product": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"product_id": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-targeted@1.17.30-2.150.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-devel@2.4.6-137.1.el5_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-strict@2.4.6-137.1.el5_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy@2.4.6-137.1.el5_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-targeted@2.4.6-137.1.el5_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"product": {
"name": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"product_id": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/selinux-policy-mls@2.4.6-137.1.el5_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-0:9.2.1-10.el2.src"
},
"product_reference": "bind-0:9.2.1-10.el2.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-devel-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-devel-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-utils-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:bind-utils-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.src as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-0:9.2.1-10.el2.src"
},
"product_reference": "bind-0:9.2.1-10.el2.src",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-devel-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-devel-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-utils-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:bind-utils-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-0:9.2.1-10.el2.src"
},
"product_reference": "bind-0:9.2.1-10.el2.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-devel-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-devel-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-utils-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:bind-utils-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-0:9.2.1-10.el2.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-0:9.2.1-10.el2.src"
},
"product_reference": "bind-0:9.2.1-10.el2.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-devel-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-devel-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-devel-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-utils-0:9.2.1-10.el2.i386"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-0:9.2.1-10.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:bind-utils-0:9.2.1-10.el2.ia64"
},
"product_reference": "bind-utils-0:9.2.1-10.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.src"
},
"product_reference": "bind-20:9.2.4-22.el3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-chroot-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-debuginfo-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-devel-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-libs-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:bind-utils-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.src"
},
"product_reference": "bind-20:9.2.4-22.el3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-chroot-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-debuginfo-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-devel-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-libs-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:bind-utils-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.src"
},
"product_reference": "bind-20:9.2.4-22.el3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-chroot-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-debuginfo-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-devel-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-libs-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:bind-utils-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.src"
},
"product_reference": "bind-20:9.2.4-22.el3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-chroot-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-debuginfo-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-devel-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-libs-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.i386"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.ia64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.ppc"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.s390"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.s390x"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-22.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:bind-utils-20:9.2.4-22.el3.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-22.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.src"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-devel-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-libs-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:bind-utils-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.src"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.src"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-devel-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-libs-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:bind-utils-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.src"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.src"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-chroot-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-devel-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-libs-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:bind-utils-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.src"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.src"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-devel-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-libs-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.i386"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.ia64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.ppc"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.s390"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.s390x"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-20:9.2.4-28.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:bind-utils-20:9.2.4-28.0.1.el4.x86_64"
},
"product_reference": "bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:1.17.30-2.150.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.src"
},
"product_reference": "selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch"
},
"product_reference": "selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.src"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.src"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-0:2.4.6-137.1.el5_2.src"
},
"product_reference": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.src"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64"
},
"product_reference": "caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-0:2.4.6-137.1.el5_2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-0:2.4.6-137.1.el5_2.src"
},
"product_reference": "selinux-policy-0:2.4.6-137.1.el5_2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch"
},
"product_reference": "selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Dan Kaminsky"
]
}
],
"cve": "CVE-2008-1447",
"discovery_date": "2008-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "449345"
}
],
"notes": [
{
"category": "description",
"text": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bind: implement source UDP port randomization (CERT VU#800113)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:bind-0:9.2.1-10.el2.i386",
"2.1AS:bind-0:9.2.1-10.el2.ia64",
"2.1AS:bind-0:9.2.1-10.el2.src",
"2.1AS:bind-devel-0:9.2.1-10.el2.i386",
"2.1AS:bind-devel-0:9.2.1-10.el2.ia64",
"2.1AS:bind-utils-0:9.2.1-10.el2.i386",
"2.1AS:bind-utils-0:9.2.1-10.el2.ia64",
"2.1AW:bind-0:9.2.1-10.el2.i386",
"2.1AW:bind-0:9.2.1-10.el2.ia64",
"2.1AW:bind-0:9.2.1-10.el2.src",
"2.1AW:bind-devel-0:9.2.1-10.el2.i386",
"2.1AW:bind-devel-0:9.2.1-10.el2.ia64",
"2.1AW:bind-utils-0:9.2.1-10.el2.i386",
"2.1AW:bind-utils-0:9.2.1-10.el2.ia64",
"2.1ES:bind-0:9.2.1-10.el2.i386",
"2.1ES:bind-0:9.2.1-10.el2.ia64",
"2.1ES:bind-0:9.2.1-10.el2.src",
"2.1ES:bind-devel-0:9.2.1-10.el2.i386",
"2.1ES:bind-devel-0:9.2.1-10.el2.ia64",
"2.1ES:bind-utils-0:9.2.1-10.el2.i386",
"2.1ES:bind-utils-0:9.2.1-10.el2.ia64",
"2.1WS:bind-0:9.2.1-10.el2.i386",
"2.1WS:bind-0:9.2.1-10.el2.ia64",
"2.1WS:bind-0:9.2.1-10.el2.src",
"2.1WS:bind-devel-0:9.2.1-10.el2.i386",
"2.1WS:bind-devel-0:9.2.1-10.el2.ia64",
"2.1WS:bind-utils-0:9.2.1-10.el2.i386",
"2.1WS:bind-utils-0:9.2.1-10.el2.ia64",
"3AS:bind-20:9.2.4-22.el3.i386",
"3AS:bind-20:9.2.4-22.el3.ia64",
"3AS:bind-20:9.2.4-22.el3.ppc",
"3AS:bind-20:9.2.4-22.el3.s390",
"3AS:bind-20:9.2.4-22.el3.s390x",
"3AS:bind-20:9.2.4-22.el3.src",
"3AS:bind-20:9.2.4-22.el3.x86_64",
"3AS:bind-chroot-20:9.2.4-22.el3.i386",
"3AS:bind-chroot-20:9.2.4-22.el3.ia64",
"3AS:bind-chroot-20:9.2.4-22.el3.ppc",
"3AS:bind-chroot-20:9.2.4-22.el3.s390",
"3AS:bind-chroot-20:9.2.4-22.el3.s390x",
"3AS:bind-chroot-20:9.2.4-22.el3.x86_64",
"3AS:bind-debuginfo-20:9.2.4-22.el3.i386",
"3AS:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3AS:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3AS:bind-debuginfo-20:9.2.4-22.el3.s390",
"3AS:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3AS:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3AS:bind-devel-20:9.2.4-22.el3.i386",
"3AS:bind-devel-20:9.2.4-22.el3.ia64",
"3AS:bind-devel-20:9.2.4-22.el3.ppc",
"3AS:bind-devel-20:9.2.4-22.el3.s390",
"3AS:bind-devel-20:9.2.4-22.el3.s390x",
"3AS:bind-devel-20:9.2.4-22.el3.x86_64",
"3AS:bind-libs-20:9.2.4-22.el3.i386",
"3AS:bind-libs-20:9.2.4-22.el3.ia64",
"3AS:bind-libs-20:9.2.4-22.el3.ppc",
"3AS:bind-libs-20:9.2.4-22.el3.s390",
"3AS:bind-libs-20:9.2.4-22.el3.s390x",
"3AS:bind-libs-20:9.2.4-22.el3.x86_64",
"3AS:bind-utils-20:9.2.4-22.el3.i386",
"3AS:bind-utils-20:9.2.4-22.el3.ia64",
"3AS:bind-utils-20:9.2.4-22.el3.ppc",
"3AS:bind-utils-20:9.2.4-22.el3.s390",
"3AS:bind-utils-20:9.2.4-22.el3.s390x",
"3AS:bind-utils-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-20:9.2.4-22.el3.i386",
"3Desktop:bind-20:9.2.4-22.el3.ia64",
"3Desktop:bind-20:9.2.4-22.el3.ppc",
"3Desktop:bind-20:9.2.4-22.el3.s390",
"3Desktop:bind-20:9.2.4-22.el3.s390x",
"3Desktop:bind-20:9.2.4-22.el3.src",
"3Desktop:bind-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-chroot-20:9.2.4-22.el3.i386",
"3Desktop:bind-chroot-20:9.2.4-22.el3.ia64",
"3Desktop:bind-chroot-20:9.2.4-22.el3.ppc",
"3Desktop:bind-chroot-20:9.2.4-22.el3.s390",
"3Desktop:bind-chroot-20:9.2.4-22.el3.s390x",
"3Desktop:bind-chroot-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.i386",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-devel-20:9.2.4-22.el3.i386",
"3Desktop:bind-devel-20:9.2.4-22.el3.ia64",
"3Desktop:bind-devel-20:9.2.4-22.el3.ppc",
"3Desktop:bind-devel-20:9.2.4-22.el3.s390",
"3Desktop:bind-devel-20:9.2.4-22.el3.s390x",
"3Desktop:bind-devel-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-libs-20:9.2.4-22.el3.i386",
"3Desktop:bind-libs-20:9.2.4-22.el3.ia64",
"3Desktop:bind-libs-20:9.2.4-22.el3.ppc",
"3Desktop:bind-libs-20:9.2.4-22.el3.s390",
"3Desktop:bind-libs-20:9.2.4-22.el3.s390x",
"3Desktop:bind-libs-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-utils-20:9.2.4-22.el3.i386",
"3Desktop:bind-utils-20:9.2.4-22.el3.ia64",
"3Desktop:bind-utils-20:9.2.4-22.el3.ppc",
"3Desktop:bind-utils-20:9.2.4-22.el3.s390",
"3Desktop:bind-utils-20:9.2.4-22.el3.s390x",
"3Desktop:bind-utils-20:9.2.4-22.el3.x86_64",
"3ES:bind-20:9.2.4-22.el3.i386",
"3ES:bind-20:9.2.4-22.el3.ia64",
"3ES:bind-20:9.2.4-22.el3.ppc",
"3ES:bind-20:9.2.4-22.el3.s390",
"3ES:bind-20:9.2.4-22.el3.s390x",
"3ES:bind-20:9.2.4-22.el3.src",
"3ES:bind-20:9.2.4-22.el3.x86_64",
"3ES:bind-chroot-20:9.2.4-22.el3.i386",
"3ES:bind-chroot-20:9.2.4-22.el3.ia64",
"3ES:bind-chroot-20:9.2.4-22.el3.ppc",
"3ES:bind-chroot-20:9.2.4-22.el3.s390",
"3ES:bind-chroot-20:9.2.4-22.el3.s390x",
"3ES:bind-chroot-20:9.2.4-22.el3.x86_64",
"3ES:bind-debuginfo-20:9.2.4-22.el3.i386",
"3ES:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3ES:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3ES:bind-debuginfo-20:9.2.4-22.el3.s390",
"3ES:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3ES:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3ES:bind-devel-20:9.2.4-22.el3.i386",
"3ES:bind-devel-20:9.2.4-22.el3.ia64",
"3ES:bind-devel-20:9.2.4-22.el3.ppc",
"3ES:bind-devel-20:9.2.4-22.el3.s390",
"3ES:bind-devel-20:9.2.4-22.el3.s390x",
"3ES:bind-devel-20:9.2.4-22.el3.x86_64",
"3ES:bind-libs-20:9.2.4-22.el3.i386",
"3ES:bind-libs-20:9.2.4-22.el3.ia64",
"3ES:bind-libs-20:9.2.4-22.el3.ppc",
"3ES:bind-libs-20:9.2.4-22.el3.s390",
"3ES:bind-libs-20:9.2.4-22.el3.s390x",
"3ES:bind-libs-20:9.2.4-22.el3.x86_64",
"3ES:bind-utils-20:9.2.4-22.el3.i386",
"3ES:bind-utils-20:9.2.4-22.el3.ia64",
"3ES:bind-utils-20:9.2.4-22.el3.ppc",
"3ES:bind-utils-20:9.2.4-22.el3.s390",
"3ES:bind-utils-20:9.2.4-22.el3.s390x",
"3ES:bind-utils-20:9.2.4-22.el3.x86_64",
"3WS:bind-20:9.2.4-22.el3.i386",
"3WS:bind-20:9.2.4-22.el3.ia64",
"3WS:bind-20:9.2.4-22.el3.ppc",
"3WS:bind-20:9.2.4-22.el3.s390",
"3WS:bind-20:9.2.4-22.el3.s390x",
"3WS:bind-20:9.2.4-22.el3.src",
"3WS:bind-20:9.2.4-22.el3.x86_64",
"3WS:bind-chroot-20:9.2.4-22.el3.i386",
"3WS:bind-chroot-20:9.2.4-22.el3.ia64",
"3WS:bind-chroot-20:9.2.4-22.el3.ppc",
"3WS:bind-chroot-20:9.2.4-22.el3.s390",
"3WS:bind-chroot-20:9.2.4-22.el3.s390x",
"3WS:bind-chroot-20:9.2.4-22.el3.x86_64",
"3WS:bind-debuginfo-20:9.2.4-22.el3.i386",
"3WS:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3WS:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3WS:bind-debuginfo-20:9.2.4-22.el3.s390",
"3WS:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3WS:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3WS:bind-devel-20:9.2.4-22.el3.i386",
"3WS:bind-devel-20:9.2.4-22.el3.ia64",
"3WS:bind-devel-20:9.2.4-22.el3.ppc",
"3WS:bind-devel-20:9.2.4-22.el3.s390",
"3WS:bind-devel-20:9.2.4-22.el3.s390x",
"3WS:bind-devel-20:9.2.4-22.el3.x86_64",
"3WS:bind-libs-20:9.2.4-22.el3.i386",
"3WS:bind-libs-20:9.2.4-22.el3.ia64",
"3WS:bind-libs-20:9.2.4-22.el3.ppc",
"3WS:bind-libs-20:9.2.4-22.el3.s390",
"3WS:bind-libs-20:9.2.4-22.el3.s390x",
"3WS:bind-libs-20:9.2.4-22.el3.x86_64",
"3WS:bind-utils-20:9.2.4-22.el3.i386",
"3WS:bind-utils-20:9.2.4-22.el3.ia64",
"3WS:bind-utils-20:9.2.4-22.el3.ppc",
"3WS:bind-utils-20:9.2.4-22.el3.s390",
"3WS:bind-utils-20:9.2.4-22.el3.s390x",
"3WS:bind-utils-20:9.2.4-22.el3.x86_64",
"4AS:bind-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-20:9.2.4-28.0.1.el4.src",
"4AS:bind-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4AS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4Desktop:bind-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-20:9.2.4-28.0.1.el4.src",
"4Desktop:bind-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4Desktop:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4ES:bind-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-20:9.2.4-28.0.1.el4.src",
"4ES:bind-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4ES:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4WS:bind-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-20:9.2.4-28.0.1.el4.src",
"4WS:bind-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4WS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-0:2.4.6-137.1.el5_2.src",
"5Client:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-0:2.4.6-137.1.el5_2.src",
"5Server:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1447"
},
{
"category": "external",
"summary": "RHBZ#449345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447"
}
],
"release_date": "2008-07-08T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-07-08T18:12:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:bind-0:9.2.1-10.el2.i386",
"2.1AS:bind-0:9.2.1-10.el2.ia64",
"2.1AS:bind-0:9.2.1-10.el2.src",
"2.1AS:bind-devel-0:9.2.1-10.el2.i386",
"2.1AS:bind-devel-0:9.2.1-10.el2.ia64",
"2.1AS:bind-utils-0:9.2.1-10.el2.i386",
"2.1AS:bind-utils-0:9.2.1-10.el2.ia64",
"2.1AW:bind-0:9.2.1-10.el2.i386",
"2.1AW:bind-0:9.2.1-10.el2.ia64",
"2.1AW:bind-0:9.2.1-10.el2.src",
"2.1AW:bind-devel-0:9.2.1-10.el2.i386",
"2.1AW:bind-devel-0:9.2.1-10.el2.ia64",
"2.1AW:bind-utils-0:9.2.1-10.el2.i386",
"2.1AW:bind-utils-0:9.2.1-10.el2.ia64",
"2.1ES:bind-0:9.2.1-10.el2.i386",
"2.1ES:bind-0:9.2.1-10.el2.ia64",
"2.1ES:bind-0:9.2.1-10.el2.src",
"2.1ES:bind-devel-0:9.2.1-10.el2.i386",
"2.1ES:bind-devel-0:9.2.1-10.el2.ia64",
"2.1ES:bind-utils-0:9.2.1-10.el2.i386",
"2.1ES:bind-utils-0:9.2.1-10.el2.ia64",
"2.1WS:bind-0:9.2.1-10.el2.i386",
"2.1WS:bind-0:9.2.1-10.el2.ia64",
"2.1WS:bind-0:9.2.1-10.el2.src",
"2.1WS:bind-devel-0:9.2.1-10.el2.i386",
"2.1WS:bind-devel-0:9.2.1-10.el2.ia64",
"2.1WS:bind-utils-0:9.2.1-10.el2.i386",
"2.1WS:bind-utils-0:9.2.1-10.el2.ia64",
"3AS:bind-20:9.2.4-22.el3.i386",
"3AS:bind-20:9.2.4-22.el3.ia64",
"3AS:bind-20:9.2.4-22.el3.ppc",
"3AS:bind-20:9.2.4-22.el3.s390",
"3AS:bind-20:9.2.4-22.el3.s390x",
"3AS:bind-20:9.2.4-22.el3.src",
"3AS:bind-20:9.2.4-22.el3.x86_64",
"3AS:bind-chroot-20:9.2.4-22.el3.i386",
"3AS:bind-chroot-20:9.2.4-22.el3.ia64",
"3AS:bind-chroot-20:9.2.4-22.el3.ppc",
"3AS:bind-chroot-20:9.2.4-22.el3.s390",
"3AS:bind-chroot-20:9.2.4-22.el3.s390x",
"3AS:bind-chroot-20:9.2.4-22.el3.x86_64",
"3AS:bind-debuginfo-20:9.2.4-22.el3.i386",
"3AS:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3AS:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3AS:bind-debuginfo-20:9.2.4-22.el3.s390",
"3AS:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3AS:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3AS:bind-devel-20:9.2.4-22.el3.i386",
"3AS:bind-devel-20:9.2.4-22.el3.ia64",
"3AS:bind-devel-20:9.2.4-22.el3.ppc",
"3AS:bind-devel-20:9.2.4-22.el3.s390",
"3AS:bind-devel-20:9.2.4-22.el3.s390x",
"3AS:bind-devel-20:9.2.4-22.el3.x86_64",
"3AS:bind-libs-20:9.2.4-22.el3.i386",
"3AS:bind-libs-20:9.2.4-22.el3.ia64",
"3AS:bind-libs-20:9.2.4-22.el3.ppc",
"3AS:bind-libs-20:9.2.4-22.el3.s390",
"3AS:bind-libs-20:9.2.4-22.el3.s390x",
"3AS:bind-libs-20:9.2.4-22.el3.x86_64",
"3AS:bind-utils-20:9.2.4-22.el3.i386",
"3AS:bind-utils-20:9.2.4-22.el3.ia64",
"3AS:bind-utils-20:9.2.4-22.el3.ppc",
"3AS:bind-utils-20:9.2.4-22.el3.s390",
"3AS:bind-utils-20:9.2.4-22.el3.s390x",
"3AS:bind-utils-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-20:9.2.4-22.el3.i386",
"3Desktop:bind-20:9.2.4-22.el3.ia64",
"3Desktop:bind-20:9.2.4-22.el3.ppc",
"3Desktop:bind-20:9.2.4-22.el3.s390",
"3Desktop:bind-20:9.2.4-22.el3.s390x",
"3Desktop:bind-20:9.2.4-22.el3.src",
"3Desktop:bind-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-chroot-20:9.2.4-22.el3.i386",
"3Desktop:bind-chroot-20:9.2.4-22.el3.ia64",
"3Desktop:bind-chroot-20:9.2.4-22.el3.ppc",
"3Desktop:bind-chroot-20:9.2.4-22.el3.s390",
"3Desktop:bind-chroot-20:9.2.4-22.el3.s390x",
"3Desktop:bind-chroot-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.i386",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3Desktop:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-devel-20:9.2.4-22.el3.i386",
"3Desktop:bind-devel-20:9.2.4-22.el3.ia64",
"3Desktop:bind-devel-20:9.2.4-22.el3.ppc",
"3Desktop:bind-devel-20:9.2.4-22.el3.s390",
"3Desktop:bind-devel-20:9.2.4-22.el3.s390x",
"3Desktop:bind-devel-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-libs-20:9.2.4-22.el3.i386",
"3Desktop:bind-libs-20:9.2.4-22.el3.ia64",
"3Desktop:bind-libs-20:9.2.4-22.el3.ppc",
"3Desktop:bind-libs-20:9.2.4-22.el3.s390",
"3Desktop:bind-libs-20:9.2.4-22.el3.s390x",
"3Desktop:bind-libs-20:9.2.4-22.el3.x86_64",
"3Desktop:bind-utils-20:9.2.4-22.el3.i386",
"3Desktop:bind-utils-20:9.2.4-22.el3.ia64",
"3Desktop:bind-utils-20:9.2.4-22.el3.ppc",
"3Desktop:bind-utils-20:9.2.4-22.el3.s390",
"3Desktop:bind-utils-20:9.2.4-22.el3.s390x",
"3Desktop:bind-utils-20:9.2.4-22.el3.x86_64",
"3ES:bind-20:9.2.4-22.el3.i386",
"3ES:bind-20:9.2.4-22.el3.ia64",
"3ES:bind-20:9.2.4-22.el3.ppc",
"3ES:bind-20:9.2.4-22.el3.s390",
"3ES:bind-20:9.2.4-22.el3.s390x",
"3ES:bind-20:9.2.4-22.el3.src",
"3ES:bind-20:9.2.4-22.el3.x86_64",
"3ES:bind-chroot-20:9.2.4-22.el3.i386",
"3ES:bind-chroot-20:9.2.4-22.el3.ia64",
"3ES:bind-chroot-20:9.2.4-22.el3.ppc",
"3ES:bind-chroot-20:9.2.4-22.el3.s390",
"3ES:bind-chroot-20:9.2.4-22.el3.s390x",
"3ES:bind-chroot-20:9.2.4-22.el3.x86_64",
"3ES:bind-debuginfo-20:9.2.4-22.el3.i386",
"3ES:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3ES:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3ES:bind-debuginfo-20:9.2.4-22.el3.s390",
"3ES:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3ES:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3ES:bind-devel-20:9.2.4-22.el3.i386",
"3ES:bind-devel-20:9.2.4-22.el3.ia64",
"3ES:bind-devel-20:9.2.4-22.el3.ppc",
"3ES:bind-devel-20:9.2.4-22.el3.s390",
"3ES:bind-devel-20:9.2.4-22.el3.s390x",
"3ES:bind-devel-20:9.2.4-22.el3.x86_64",
"3ES:bind-libs-20:9.2.4-22.el3.i386",
"3ES:bind-libs-20:9.2.4-22.el3.ia64",
"3ES:bind-libs-20:9.2.4-22.el3.ppc",
"3ES:bind-libs-20:9.2.4-22.el3.s390",
"3ES:bind-libs-20:9.2.4-22.el3.s390x",
"3ES:bind-libs-20:9.2.4-22.el3.x86_64",
"3ES:bind-utils-20:9.2.4-22.el3.i386",
"3ES:bind-utils-20:9.2.4-22.el3.ia64",
"3ES:bind-utils-20:9.2.4-22.el3.ppc",
"3ES:bind-utils-20:9.2.4-22.el3.s390",
"3ES:bind-utils-20:9.2.4-22.el3.s390x",
"3ES:bind-utils-20:9.2.4-22.el3.x86_64",
"3WS:bind-20:9.2.4-22.el3.i386",
"3WS:bind-20:9.2.4-22.el3.ia64",
"3WS:bind-20:9.2.4-22.el3.ppc",
"3WS:bind-20:9.2.4-22.el3.s390",
"3WS:bind-20:9.2.4-22.el3.s390x",
"3WS:bind-20:9.2.4-22.el3.src",
"3WS:bind-20:9.2.4-22.el3.x86_64",
"3WS:bind-chroot-20:9.2.4-22.el3.i386",
"3WS:bind-chroot-20:9.2.4-22.el3.ia64",
"3WS:bind-chroot-20:9.2.4-22.el3.ppc",
"3WS:bind-chroot-20:9.2.4-22.el3.s390",
"3WS:bind-chroot-20:9.2.4-22.el3.s390x",
"3WS:bind-chroot-20:9.2.4-22.el3.x86_64",
"3WS:bind-debuginfo-20:9.2.4-22.el3.i386",
"3WS:bind-debuginfo-20:9.2.4-22.el3.ia64",
"3WS:bind-debuginfo-20:9.2.4-22.el3.ppc",
"3WS:bind-debuginfo-20:9.2.4-22.el3.s390",
"3WS:bind-debuginfo-20:9.2.4-22.el3.s390x",
"3WS:bind-debuginfo-20:9.2.4-22.el3.x86_64",
"3WS:bind-devel-20:9.2.4-22.el3.i386",
"3WS:bind-devel-20:9.2.4-22.el3.ia64",
"3WS:bind-devel-20:9.2.4-22.el3.ppc",
"3WS:bind-devel-20:9.2.4-22.el3.s390",
"3WS:bind-devel-20:9.2.4-22.el3.s390x",
"3WS:bind-devel-20:9.2.4-22.el3.x86_64",
"3WS:bind-libs-20:9.2.4-22.el3.i386",
"3WS:bind-libs-20:9.2.4-22.el3.ia64",
"3WS:bind-libs-20:9.2.4-22.el3.ppc",
"3WS:bind-libs-20:9.2.4-22.el3.s390",
"3WS:bind-libs-20:9.2.4-22.el3.s390x",
"3WS:bind-libs-20:9.2.4-22.el3.x86_64",
"3WS:bind-utils-20:9.2.4-22.el3.i386",
"3WS:bind-utils-20:9.2.4-22.el3.ia64",
"3WS:bind-utils-20:9.2.4-22.el3.ppc",
"3WS:bind-utils-20:9.2.4-22.el3.s390",
"3WS:bind-utils-20:9.2.4-22.el3.s390x",
"3WS:bind-utils-20:9.2.4-22.el3.x86_64",
"4AS:bind-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-20:9.2.4-28.0.1.el4.src",
"4AS:bind-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4AS:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4AS:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4AS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4Desktop:bind-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-20:9.2.4-28.0.1.el4.src",
"4Desktop:bind-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4Desktop:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4Desktop:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4Desktop:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4ES:bind-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-20:9.2.4-28.0.1.el4.src",
"4ES:bind-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4ES:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4ES:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4ES:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"4WS:bind-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-20:9.2.4-28.0.1.el4.src",
"4WS:bind-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-chroot-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.ppc64",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-debuginfo-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-devel-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.ppc64",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-libs-20:9.2.4-28.0.1.el4.x86_64",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.i386",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.ia64",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.ppc",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.s390",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.s390x",
"4WS:bind-utils-20:9.2.4-28.0.1.el4.x86_64",
"4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.noarch",
"4WS:selinux-policy-targeted-0:1.17.30-2.150.el4.src",
"4WS:selinux-policy-targeted-sources-0:1.17.30-2.150.el4.noarch",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Client-Workstation:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client-Workstation:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Client:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Client:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Client:selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-0:2.4.6-137.1.el5_2.src",
"5Client:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"5Client:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.src",
"5Server:bind-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-chroot-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-debuginfo-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-libbind-devel-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.ppc64",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-libs-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-sdb-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:bind-utils-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.i386",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ia64",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.ppc",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.s390x",
"5Server:caching-nameserver-30:9.3.4-6.0.2.P1.el5_2.x86_64",
"5Server:selinux-policy-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-0:2.4.6-137.1.el5_2.src",
"5Server:selinux-policy-devel-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-mls-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-strict-0:2.4.6-137.1.el5_2.noarch",
"5Server:selinux-policy-targeted-0:2.4.6-137.1.el5_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0533"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "bind: implement source UDP port randomization (CERT VU#800113)"
}
]
}
OPENSUSE-SU-2024:10612-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2008-1447/ | self |
| https://www.suse.com/security/cve/CVE-2017-9103/ | self |
| https://www.suse.com/security/cve/CVE-2017-9106/ | self |
| https://www.suse.com/security/cve/CVE-2017-9107/ | self |
| https://www.suse.com/security/cve/CVE-2017-9108/ | self |
| https://www.suse.com/security/cve/CVE-2008-1447 | external |
| https://bugzilla.suse.com/396963 | external |
| https://bugzilla.suse.com/411761 | external |
| https://bugzilla.suse.com/415678 | external |
| https://bugzilla.suse.com/423234 | external |
| https://bugzilla.suse.com/426515 | external |
| https://bugzilla.suse.com/465294 | external |
| https://www.suse.com/security/cve/CVE-2017-9103 | external |
| https://bugzilla.suse.com/1172265 | external |
| https://www.suse.com/security/cve/CVE-2017-9106 | external |
| https://bugzilla.suse.com/1172265 | external |
| https://www.suse.com/security/cve/CVE-2017-9107 | external |
| https://bugzilla.suse.com/1172265 | external |
| https://www.suse.com/security/cve/CVE-2017-9108 | external |
| https://bugzilla.suse.com/1172265 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "adns-1.6.0-1.8 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the adns-1.6.0-1.8 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10612",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10612-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1447 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9103 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9106 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9107 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9108 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9108/"
}
],
"title": "adns-1.6.0-1.8 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10612-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "adns-1.6.0-1.8.aarch64",
"product": {
"name": "adns-1.6.0-1.8.aarch64",
"product_id": "adns-1.6.0-1.8.aarch64"
}
},
{
"category": "product_version",
"name": "libadns-devel-1.6.0-1.8.aarch64",
"product": {
"name": "libadns-devel-1.6.0-1.8.aarch64",
"product_id": "libadns-devel-1.6.0-1.8.aarch64"
}
},
{
"category": "product_version",
"name": "libadns-devel-32bit-1.6.0-1.8.aarch64",
"product": {
"name": "libadns-devel-32bit-1.6.0-1.8.aarch64",
"product_id": "libadns-devel-32bit-1.6.0-1.8.aarch64"
}
},
{
"category": "product_version",
"name": "libadns1-1.6.0-1.8.aarch64",
"product": {
"name": "libadns1-1.6.0-1.8.aarch64",
"product_id": "libadns1-1.6.0-1.8.aarch64"
}
},
{
"category": "product_version",
"name": "libadns1-32bit-1.6.0-1.8.aarch64",
"product": {
"name": "libadns1-32bit-1.6.0-1.8.aarch64",
"product_id": "libadns1-32bit-1.6.0-1.8.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "adns-1.6.0-1.8.ppc64le",
"product": {
"name": "adns-1.6.0-1.8.ppc64le",
"product_id": "adns-1.6.0-1.8.ppc64le"
}
},
{
"category": "product_version",
"name": "libadns-devel-1.6.0-1.8.ppc64le",
"product": {
"name": "libadns-devel-1.6.0-1.8.ppc64le",
"product_id": "libadns-devel-1.6.0-1.8.ppc64le"
}
},
{
"category": "product_version",
"name": "libadns-devel-32bit-1.6.0-1.8.ppc64le",
"product": {
"name": "libadns-devel-32bit-1.6.0-1.8.ppc64le",
"product_id": "libadns-devel-32bit-1.6.0-1.8.ppc64le"
}
},
{
"category": "product_version",
"name": "libadns1-1.6.0-1.8.ppc64le",
"product": {
"name": "libadns1-1.6.0-1.8.ppc64le",
"product_id": "libadns1-1.6.0-1.8.ppc64le"
}
},
{
"category": "product_version",
"name": "libadns1-32bit-1.6.0-1.8.ppc64le",
"product": {
"name": "libadns1-32bit-1.6.0-1.8.ppc64le",
"product_id": "libadns1-32bit-1.6.0-1.8.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "adns-1.6.0-1.8.s390x",
"product": {
"name": "adns-1.6.0-1.8.s390x",
"product_id": "adns-1.6.0-1.8.s390x"
}
},
{
"category": "product_version",
"name": "libadns-devel-1.6.0-1.8.s390x",
"product": {
"name": "libadns-devel-1.6.0-1.8.s390x",
"product_id": "libadns-devel-1.6.0-1.8.s390x"
}
},
{
"category": "product_version",
"name": "libadns-devel-32bit-1.6.0-1.8.s390x",
"product": {
"name": "libadns-devel-32bit-1.6.0-1.8.s390x",
"product_id": "libadns-devel-32bit-1.6.0-1.8.s390x"
}
},
{
"category": "product_version",
"name": "libadns1-1.6.0-1.8.s390x",
"product": {
"name": "libadns1-1.6.0-1.8.s390x",
"product_id": "libadns1-1.6.0-1.8.s390x"
}
},
{
"category": "product_version",
"name": "libadns1-32bit-1.6.0-1.8.s390x",
"product": {
"name": "libadns1-32bit-1.6.0-1.8.s390x",
"product_id": "libadns1-32bit-1.6.0-1.8.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "adns-1.6.0-1.8.x86_64",
"product": {
"name": "adns-1.6.0-1.8.x86_64",
"product_id": "adns-1.6.0-1.8.x86_64"
}
},
{
"category": "product_version",
"name": "libadns-devel-1.6.0-1.8.x86_64",
"product": {
"name": "libadns-devel-1.6.0-1.8.x86_64",
"product_id": "libadns-devel-1.6.0-1.8.x86_64"
}
},
{
"category": "product_version",
"name": "libadns-devel-32bit-1.6.0-1.8.x86_64",
"product": {
"name": "libadns-devel-32bit-1.6.0-1.8.x86_64",
"product_id": "libadns-devel-32bit-1.6.0-1.8.x86_64"
}
},
{
"category": "product_version",
"name": "libadns1-1.6.0-1.8.x86_64",
"product": {
"name": "libadns1-1.6.0-1.8.x86_64",
"product_id": "libadns1-1.6.0-1.8.x86_64"
}
},
{
"category": "product_version",
"name": "libadns1-32bit-1.6.0-1.8.x86_64",
"product": {
"name": "libadns1-32bit-1.6.0-1.8.x86_64",
"product_id": "libadns1-32bit-1.6.0-1.8.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "adns-1.6.0-1.8.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64"
},
"product_reference": "adns-1.6.0-1.8.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "adns-1.6.0-1.8.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le"
},
"product_reference": "adns-1.6.0-1.8.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "adns-1.6.0-1.8.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:adns-1.6.0-1.8.s390x"
},
"product_reference": "adns-1.6.0-1.8.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "adns-1.6.0-1.8.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64"
},
"product_reference": "adns-1.6.0-1.8.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns-devel-1.6.0-1.8.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64"
},
"product_reference": "libadns-devel-1.6.0-1.8.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns-devel-1.6.0-1.8.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le"
},
"product_reference": "libadns-devel-1.6.0-1.8.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns-devel-1.6.0-1.8.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x"
},
"product_reference": "libadns-devel-1.6.0-1.8.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns-devel-1.6.0-1.8.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64"
},
"product_reference": "libadns-devel-1.6.0-1.8.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns-devel-32bit-1.6.0-1.8.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64"
},
"product_reference": "libadns-devel-32bit-1.6.0-1.8.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns-devel-32bit-1.6.0-1.8.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le"
},
"product_reference": "libadns-devel-32bit-1.6.0-1.8.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns-devel-32bit-1.6.0-1.8.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x"
},
"product_reference": "libadns-devel-32bit-1.6.0-1.8.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns-devel-32bit-1.6.0-1.8.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64"
},
"product_reference": "libadns-devel-32bit-1.6.0-1.8.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns1-1.6.0-1.8.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64"
},
"product_reference": "libadns1-1.6.0-1.8.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns1-1.6.0-1.8.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le"
},
"product_reference": "libadns1-1.6.0-1.8.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns1-1.6.0-1.8.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x"
},
"product_reference": "libadns1-1.6.0-1.8.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns1-1.6.0-1.8.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64"
},
"product_reference": "libadns1-1.6.0-1.8.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns1-32bit-1.6.0-1.8.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64"
},
"product_reference": "libadns1-32bit-1.6.0-1.8.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns1-32bit-1.6.0-1.8.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le"
},
"product_reference": "libadns1-32bit-1.6.0-1.8.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns1-32bit-1.6.0-1.8.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x"
},
"product_reference": "libadns1-32bit-1.6.0-1.8.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libadns1-32bit-1.6.0-1.8.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
},
"product_reference": "libadns1-32bit-1.6.0-1.8.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1447"
}
],
"notes": [
{
"category": "general",
"text": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1447",
"url": "https://www.suse.com/security/cve/CVE-2008-1447"
},
{
"category": "external",
"summary": "SUSE Bug 396963 for CVE-2008-1447",
"url": "https://bugzilla.suse.com/396963"
},
{
"category": "external",
"summary": "SUSE Bug 411761 for CVE-2008-1447",
"url": "https://bugzilla.suse.com/411761"
},
{
"category": "external",
"summary": "SUSE Bug 415678 for CVE-2008-1447",
"url": "https://bugzilla.suse.com/415678"
},
{
"category": "external",
"summary": "SUSE Bug 423234 for CVE-2008-1447",
"url": "https://bugzilla.suse.com/423234"
},
{
"category": "external",
"summary": "SUSE Bug 426515 for CVE-2008-1447",
"url": "https://bugzilla.suse.com/426515"
},
{
"category": "external",
"summary": "SUSE Bug 465294 for CVE-2008-1447",
"url": "https://bugzilla.suse.com/465294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-1447"
},
{
"cve": "CVE-2017-9103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9103"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9103",
"url": "https://www.suse.com/security/cve/CVE-2017-9103"
},
{
"category": "external",
"summary": "SUSE Bug 1172265 for CVE-2017-9103",
"url": "https://bugzilla.suse.com/1172265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-9103"
},
{
"cve": "CVE-2017-9106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9106"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn\u0027t, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. It may be better to require the caller to make the pointer structure right, but to have the code here be defensive about (and tolerate with an error but without crashing) out-of-range integer values. So: it should defend each of these integer conversion sites with a check for the actual permitted range, and return adns_s_invaliddata if not. The lack of this check causes the SOA sign extension bug to be a serious security problem: the sign extended SOA value is out of range, and overruns the buffer when reconverted. This is related to sign extending SOA 32-bit integer fields, and use of a signed data type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9106",
"url": "https://www.suse.com/security/cve/CVE-2017-9106"
},
{
"category": "external",
"summary": "SUSE Bug 1172265 for CVE-2017-9106",
"url": "https://bugzilla.suse.com/1172265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-9106"
},
{
"cve": "CVE-2017-9107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9107"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \\, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invalid. But before then it might outrun available memory and crash. In principle this could be a denial of service attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9107",
"url": "https://www.suse.com/security/cve/CVE-2017-9107"
},
{
"category": "external",
"summary": "SUSE Bug 1172265 for CVE-2017-9107",
"url": "https://bugzilla.suse.com/1172265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-9107"
},
{
"cve": "CVE-2017-9108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9108"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9108",
"url": "https://www.suse.com/security/cve/CVE-2017-9108"
},
{
"category": "external",
"summary": "SUSE Bug 1172265 for CVE-2017-9108",
"url": "https://bugzilla.suse.com/1172265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:adns-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:adns-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:adns-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:adns-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns-devel-32bit-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-1.6.0-1.8.x86_64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.aarch64",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.ppc64le",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.s390x",
"openSUSE Tumbleweed:libadns1-32bit-1.6.0-1.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-9108"
}
]
}
GHSA-R5R9-27M2-2JG7
Vulnerability from github – Published: 2022-05-03 03:19 – Updated: 2022-05-03 03:19The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
{
"affected": [],
"aliases": [
"CVE-2008-1447"
],
"database_specific": {
"cwe_ids": [
"CWE-331"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-07-08T23:41:00Z",
"severity": "MODERATE"
},
"details": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"",
"id": "GHSA-r5r9-27m2-2jg7",
"modified": "2022-05-03T03:19:14Z",
"published": "2022-05-03T03:19:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447"
},
{
"type": "WEB",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
},
{
"type": "WEB",
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"type": "WEB",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
},
{
"type": "WEB",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"type": "WEB",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30925"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30973"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30977"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30979"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30980"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30988"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30989"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30998"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31011"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31012"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31014"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31019"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31022"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31030"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31031"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31033"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31052"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31065"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31072"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31093"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31094"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31137"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31143"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31151"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31152"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31153"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31169"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31197"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31199"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31204"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31207"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31209"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31212"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31213"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31221"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31236"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31237"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31254"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31326"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31354"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31422"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31430"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31451"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31482"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31495"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31588"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31687"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31823"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31882"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31900"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33178"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33714"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33786"
},
{
"type": "WEB",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3026"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3129"
},
{
"type": "WEB",
"url": "http://support.citrix.com/article/CTX117991"
},
{
"type": "WEB",
"url": "http://support.citrix.com/article/CTX118183"
},
{
"type": "WEB",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152"
},
{
"type": "WEB",
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
},
{
"type": "WEB",
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"type": "WEB",
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
},
{
"type": "WEB",
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
},
{
"type": "WEB",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"type": "WEB",
"url": "http://www.doxpara.com/?p=1176"
},
{
"type": "WEB",
"url": "http://www.doxpara.com/DMK_BO2K8.ppt"
},
{
"type": "WEB",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"type": "WEB",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"type": "WEB",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"type": "WEB",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"type": "WEB",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"type": "WEB",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"type": "WEB",
"url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40"
},
{
"type": "WEB",
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
},
{
"type": "WEB",
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"type": "WEB",
"url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
},
{
"type": "WEB",
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"type": "WEB",
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"type": "WEB",
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"type": "WEB",
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
},
{
"type": "WEB",
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"type": "WEB",
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/30131"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020437"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020438"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020440"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020448"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020449"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020548"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020558"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020560"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020561"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020575"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020576"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020577"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020578"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020579"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020651"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020653"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020702"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020802"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020804"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"type": "WEB",
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/0622"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2008-1447
Vulnerability from fkie_nvd - Published: 2008-07-08 23:41 - Updated: 2026-04-23 00:35| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc | Third Party Advisory, Vendor Advisory | |
| secure@microsoft.com | http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html | Technical Description | |
| secure@microsoft.com | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 | Third Party Advisory | |
| secure@microsoft.com | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520 | Broken Link | |
| secure@microsoft.com | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368 | Broken Link | |
| secure@microsoft.com | http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html | Mailing List, Third Party Advisory | |
| secure@microsoft.com | http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html | Mailing List, Third Party Advisory | |
| secure@microsoft.com | http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html | Mailing List, Third Party Advisory | |
| secure@microsoft.com | http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html | Mailing List, Third Party Advisory | |
| secure@microsoft.com | http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html | Broken Link | |
| secure@microsoft.com | http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html | Third Party Advisory | |
| secure@microsoft.com | http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html | Third Party Advisory | |
| secure@microsoft.com | http://marc.info/?l=bugtraq&m=121630706004256&w=2 | Third Party Advisory | |
| secure@microsoft.com | http://marc.info/?l=bugtraq&m=121866517322103&w=2 | Third Party Advisory | |
| secure@microsoft.com | http://marc.info/?l=bugtraq&m=123324863916385&w=2 | Third Party Advisory | |
| secure@microsoft.com | http://marc.info/?l=bugtraq&m=141879471518471&w=2 | Third Party Advisory | |
| secure@microsoft.com | http://rhn.redhat.com/errata/RHSA-2008-0533.html | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/30925 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/30973 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/30977 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/30979 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/30980 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/30988 | Third Party Advisory, Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/30989 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/30998 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31011 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31012 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31014 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31019 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31022 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31030 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31031 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31033 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31052 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31065 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31072 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31093 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31094 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31137 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31143 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31151 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31152 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31153 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31169 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31197 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31199 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31204 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31207 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31209 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31212 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31213 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31221 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31236 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31237 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31254 | Vendor Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31326 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31354 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31422 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31430 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31451 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31482 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31495 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31588 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31687 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31823 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31882 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/31900 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/33178 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/33714 | Third Party Advisory | |
| secure@microsoft.com | http://secunia.com/advisories/33786 | Third Party Advisory | |
| secure@microsoft.com | http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc | Third Party Advisory | |
| secure@microsoft.com | http://security.gentoo.org/glsa/glsa-200807-08.xml | Third Party Advisory | |
| secure@microsoft.com | http://security.gentoo.org/glsa/glsa-200812-17.xml | Third Party Advisory | |
| secure@microsoft.com | http://security.gentoo.org/glsa/glsa-201209-25.xml | Third Party Advisory | |
| secure@microsoft.com | http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680 | Third Party Advisory | |
| secure@microsoft.com | http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239 | Third Party Advisory | |
| secure@microsoft.com | http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1 | Third Party Advisory | |
| secure@microsoft.com | http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1 | Third Party Advisory | |
| secure@microsoft.com | http://support.apple.com/kb/HT3026 | Third Party Advisory | |
| secure@microsoft.com | http://support.apple.com/kb/HT3129 | Third Party Advisory | |
| secure@microsoft.com | http://support.citrix.com/article/CTX117991 | Third Party Advisory | |
| secure@microsoft.com | http://support.citrix.com/article/CTX118183 | Third Party Advisory | |
| secure@microsoft.com | http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152 | Third Party Advisory | |
| secure@microsoft.com | http://up2date.astaro.com/2008/08/up2date_7202_released.html | Third Party Advisory | |
| secure@microsoft.com | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231 | Third Party Advisory | |
| secure@microsoft.com | http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018 | Third Party Advisory | |
| secure@microsoft.com | http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning | Third Party Advisory | |
| secure@microsoft.com | http://www.caughq.org/exploits/CAU-EX-2008-0002.txt | Third Party Advisory | |
| secure@microsoft.com | http://www.caughq.org/exploits/CAU-EX-2008-0003.txt | Third Party Advisory | |
| secure@microsoft.com | http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml | Third Party Advisory | |
| secure@microsoft.com | http://www.debian.org/security/2008/dsa-1603 | Patch | |
| secure@microsoft.com | http://www.debian.org/security/2008/dsa-1604 | Third Party Advisory | |
| secure@microsoft.com | http://www.debian.org/security/2008/dsa-1605 | Third Party Advisory | |
| secure@microsoft.com | http://www.debian.org/security/2008/dsa-1619 | Third Party Advisory | |
| secure@microsoft.com | http://www.debian.org/security/2008/dsa-1623 | Third Party Advisory | |
| secure@microsoft.com | http://www.doxpara.com/?p=1176 | Third Party Advisory | |
| secure@microsoft.com | http://www.doxpara.com/DMK_BO2K8.ppt | Third Party Advisory | |
| secure@microsoft.com | http://www.ibm.com/support/docview.wss?uid=isg1IZ26667 | Third Party Advisory | |
| secure@microsoft.com | http://www.ibm.com/support/docview.wss?uid=isg1IZ26668 | Third Party Advisory | |
| secure@microsoft.com | http://www.ibm.com/support/docview.wss?uid=isg1IZ26669 | Third Party Advisory | |
| secure@microsoft.com | http://www.ibm.com/support/docview.wss?uid=isg1IZ26670 | Third Party Advisory | |
| secure@microsoft.com | http://www.ibm.com/support/docview.wss?uid=isg1IZ26671 | Third Party Advisory | |
| secure@microsoft.com | http://www.ibm.com/support/docview.wss?uid=isg1IZ26672 | Third Party Advisory | |
| secure@microsoft.com | http://www.ipcop.org/index.php?name=News&file=article&sid=40 | Third Party Advisory | |
| secure@microsoft.com | http://www.isc.org/index.pl?/sw/bind/bind-security.php | Third Party Advisory | |
| secure@microsoft.com | http://www.kb.cert.org/vuls/id/800113 | Third Party Advisory, US Government Resource | |
| secure@microsoft.com | http://www.kb.cert.org/vuls/id/MIMG-7DWR4J | Third Party Advisory, US Government Resource | |
| secure@microsoft.com | http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q | Third Party Advisory, US Government Resource | |
| secure@microsoft.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:139 | Third Party Advisory | |
| secure@microsoft.com | http://www.nominum.com/asset_upload_file741_2661.pdf | Third Party Advisory | |
| secure@microsoft.com | http://www.novell.com/support/viewContent.do?externalId=7000912 | Third Party Advisory | |
| secure@microsoft.com | http://www.openbsd.org/errata42.html#013_bind | Third Party Advisory | |
| secure@microsoft.com | http://www.openbsd.org/errata43.html#004_bind | Third Party Advisory | |
| secure@microsoft.com | http://www.phys.uu.nl/~rombouts/pdnsd.html | Third Party Advisory | |
| secure@microsoft.com | http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog | Third Party Advisory | |
| secure@microsoft.com | http://www.redhat.com/support/errata/RHSA-2008-0789.html | Third Party Advisory | |
| secure@microsoft.com | http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html | Third Party Advisory | |
| secure@microsoft.com | http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ | Third Party Advisory | |
| secure@microsoft.com | http://www.securityfocus.com/archive/1/495289/100/0/threaded | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securityfocus.com/archive/1/495869/100/0/threaded | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securityfocus.com/bid/30131 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020437 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020438 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020440 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020448 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020449 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020548 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020558 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020560 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020561 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020575 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020576 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020577 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020578 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020579 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020651 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020653 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020702 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020802 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.securitytracker.com/id?1020804 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | http://www.ubuntu.com/usn/usn-622-1 | Third Party Advisory | |
| secure@microsoft.com | http://www.ubuntu.com/usn/usn-627-1 | Third Party Advisory | |
| secure@microsoft.com | http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html | Third Party Advisory | |
| secure@microsoft.com | http://www.us-cert.gov/cas/techalerts/TA08-190A.html | Third Party Advisory, US Government Resource | |
| secure@microsoft.com | http://www.us-cert.gov/cas/techalerts/TA08-190B.html | Third Party Advisory, US Government Resource | |
| secure@microsoft.com | http://www.us-cert.gov/cas/techalerts/TA08-260A.html | Third Party Advisory, US Government Resource | |
| secure@microsoft.com | http://www.vmware.com/security/advisories/VMSA-2008-0014.html | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2019/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2023/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2025/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2029/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2030/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2050/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2051/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2052/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2055/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2092/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2113/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2114/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2123/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2139/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2166/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2195/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2196/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2197/references | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2268 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2291 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2334 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2342 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2377 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2383 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2384 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2466 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2467 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2482 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2525 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2549 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2558 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2582 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2008/2584 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2009/0297 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2009/0311 | Third Party Advisory | |
| secure@microsoft.com | http://www.vupen.com/english/advisories/2010/0622 | Third Party Advisory | |
| secure@microsoft.com | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037 | Patch, Vendor Advisory | |
| secure@microsoft.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/43334 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/43637 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117 | Tool Signature | |
| secure@microsoft.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725 | Tool Signature | |
| secure@microsoft.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761 | Tool Signature | |
| secure@microsoft.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917 | Tool Signature | |
| secure@microsoft.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627 | Tool Signature | |
| secure@microsoft.com | https://www.exploit-db.com/exploits/6122 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | https://www.exploit-db.com/exploits/6123 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | https://www.exploit-db.com/exploits/6130 | Third Party Advisory, VDB Entry | |
| secure@microsoft.com | https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html | Third Party Advisory | |
| secure@microsoft.com | https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc | Third Party Advisory, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html | Technical Description | |
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=121630706004256&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=121866517322103&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=123324863916385&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141879471518471&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2008-0533.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30925 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30973 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30977 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30979 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30980 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30988 | Third Party Advisory, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30989 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30998 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31011 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31012 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31014 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31019 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31022 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31030 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31031 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31033 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31052 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31065 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31072 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31093 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31094 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31137 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31143 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31151 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31152 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31153 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31169 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31197 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31199 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31204 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31207 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31209 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31212 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31213 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31221 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31236 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31237 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31254 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31326 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31354 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31422 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31430 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31451 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31482 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31495 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31588 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31687 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31823 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31882 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31900 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33178 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33714 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33786 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200807-08.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200812-17.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201209-25.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3026 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3129 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.citrix.com/article/CTX117991 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.citrix.com/article/CTX118183 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://up2date.astaro.com/2008/08/up2date_7202_released.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.caughq.org/exploits/CAU-EX-2008-0002.txt | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.caughq.org/exploits/CAU-EX-2008-0003.txt | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1603 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1604 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1605 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1619 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1623 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.doxpara.com/?p=1176 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.doxpara.com/DMK_BO2K8.ppt | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=isg1IZ26667 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=isg1IZ26668 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=isg1IZ26669 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=isg1IZ26670 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=isg1IZ26671 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=isg1IZ26672 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ipcop.org/index.php?name=News&file=article&sid=40 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.isc.org/index.pl?/sw/bind/bind-security.php | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/800113 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MIMG-7DWR4J | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:139 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.nominum.com/asset_upload_file741_2661.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/support/viewContent.do?externalId=7000912 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openbsd.org/errata42.html#013_bind | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openbsd.org/errata43.html#004_bind | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.phys.uu.nl/~rombouts/pdnsd.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0789.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/495289/100/0/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/495869/100/0/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/30131 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020437 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020438 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020440 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020448 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020449 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020548 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020558 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020560 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020561 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020575 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020576 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020577 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020578 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020579 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020651 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020653 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020702 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020802 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020804 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-622-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-627-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-190A.html | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-190B.html | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-260A.html | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0014.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2019/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2023/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2025/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2029/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2030/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2050/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2051/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2052/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2055/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2092/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2113/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2114/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2123/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2139/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2166/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2195/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2196/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2197/references | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2268 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2291 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2334 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2342 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2377 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2383 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2384 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2466 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2467 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2482 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2525 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2549 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2558 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2582 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2584 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0297 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0311 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0622 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/43334 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/43637 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117 | Tool Signature | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725 | Tool Signature | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761 | Tool Signature | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917 | Tool Signature | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627 | Tool Signature | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/6122 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/6123 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/6130 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 7.04 | |
| canonical | ubuntu_linux | 7.10 | |
| canonical | ubuntu_linux | 8.04 | |
| cisco | ios | 12.0 | |
| debian | debian_linux | 4.0 | |
| microsoft | windows_2000 | * | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_server_2003 | - | |
| microsoft | windows_xp | * | |
| microsoft | windows_xp | - | |
| microsoft | windows_xp | - | |
| redhat | enterprise_linux | 2.1 | |
| redhat | enterprise_linux | 2.1 | |
| redhat | enterprise_linux | 2.1 | |
| redhat | enterprise_linux | 5 | |
| redhat | enterprise_linux | 5 | |
| redhat | enterprise_linux | 5.0 | |
| isc | bind | 4 | |
| isc | bind | 8 | |
| isc | bind | 9.2.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "E3C43D05-40F8-4769-BA6B-A376420EA972",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*",
"matchCriteriaId": "69117328-A5AD-48A5-A56A-0AA8805A113E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*",
"matchCriteriaId": "3ECE18F6-9DDD-4354-9012-B0660E184E83",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*",
"matchCriteriaId": "4A2B4F1C-737D-40DA-B12E-6C664F9A7ECA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*",
"matchCriteriaId": "DBBCB4B2-8007-4AD5-946E-396330E7DC31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*",
"matchCriteriaId": "68758D17-44AF-4472-928C-3B94A7EAD671",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*",
"matchCriteriaId": "76EDD7D7-4567-4007-86A3-95E907616C6A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*",
"matchCriteriaId": "7A933555-D875-47B9-BFA7-E030B04C1197",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*",
"matchCriteriaId": "4BAA5F63-9A88-4B38-B284-B6E6170F12A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*",
"matchCriteriaId": "9F168D81-2D2B-4B75-B907-A8AE2A3523C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*",
"matchCriteriaId": "1778D813-845D-4B79-B9AF-5D4E0B461C75",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*",
"matchCriteriaId": "A2E917A1-AFE1-4AA3-AB80-A69F152BAB51",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*",
"matchCriteriaId": "C8203007-1723-431B-ADDE-C5FE76A88619",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*",
"matchCriteriaId": "423102CB-1FA1-46BB-8345-412F35DB25B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*",
"matchCriteriaId": "98E956AB-6A8E-4C5D-89D5-52BC374B1D7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*",
"matchCriteriaId": "676A5A3B-EFE5-4B84-8F8E-CF952003F48F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*",
"matchCriteriaId": "4902A7BD-0645-4CAC-8EA8-24BD2D8B893A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
"matchCriteriaId": "492EA1BE-E678-4300-A690-3BFCD4B233B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
"matchCriteriaId": "4E3C9031-F69A-4B6A-A8CB-39027174AA01",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*",
"matchCriteriaId": "D6B5646C-FF04-4D3D-B39E-27C1056962EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*",
"matchCriteriaId": "7361D8F0-FE84-41D0-9C62-F180339DD40A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*",
"matchCriteriaId": "5454336D-724E-4027-A642-1EFCB79C1ADC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3C0D00-DF20-4B46-8A7D-99D963BD921E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*",
"matchCriteriaId": "7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "90E4653A-C63A-4568-BFF2-ECAB7AB5A55C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\""
},
{
"lang": "es",
"value": "El protocolo DNS, como es implementado en (1) BIND 8 y 9 en versiones anteriores a 9.5.0-P1, 9.4.2-P1 y 9.3.5-P1; (2) Microsoft DNS en Windows 2000 SP4, XP SP2 y SP3 y Server 2003 SP1 y SP2; y otras implementaciones permiten a atacantes remotos suplantar el tr\u00e1fico DNS a trav\u00e9s de un ataque de un cumplea\u00f1os que usa referencias in-bailiwick para llevar a cabo un envenenamiento del cach\u00e9 contra resolutores recursivos, relacionado con la insifuciente aleatoriedad de la ID de la transacci\u00f3n DNS y los puertos de origen, vulnerabilidad tambi\u00e9n conocida como \"DNS Insufficient Socket Entropy Vulnerability\" o \"the Kaminsky bug\"."
}
],
"id": "CVE-2008-1447",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2008-07-08T23:41:00.000",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
},
{
"source": "secure@microsoft.com",
"tags": [
"Technical Description"
],
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
},
{
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"source": "secure@microsoft.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30925"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30973"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30977"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30979"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30980"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30988"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30989"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30998"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31011"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31012"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31014"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31019"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31022"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31030"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31031"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31033"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31052"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31065"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31072"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31093"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31094"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31137"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31143"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31151"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31152"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31153"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31169"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31197"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31199"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31204"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31207"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31209"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31212"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31213"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31221"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31236"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31237"
},
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31254"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31326"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31354"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31422"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31430"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31451"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31482"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31495"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31588"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31687"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31823"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31882"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31900"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33178"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33714"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33786"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT3026"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT3129"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.citrix.com/article/CTX117991"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.citrix.com/article/CTX118183"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
},
{
"source": "secure@microsoft.com",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.doxpara.com/?p=1176"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.doxpara.com/DMK_BO2K8.ppt"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/30131"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020437"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020438"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020440"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020448"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020449"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020548"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020558"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020560"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020561"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020575"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020576"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020577"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020578"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020579"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020651"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020653"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020702"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020802"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020804"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"source": "secure@microsoft.com",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
},
{
"source": "secure@microsoft.com",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
},
{
"source": "secure@microsoft.com",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
},
{
"source": "secure@microsoft.com",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
},
{
"source": "secure@microsoft.com",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
},
{
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
],
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30925"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30973"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30977"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30980"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30989"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30998"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31011"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31014"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31019"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31022"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31030"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31033"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31072"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31093"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31094"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31137"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31151"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31152"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31153"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31204"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31209"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31236"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31354"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31430"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31451"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31482"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31495"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31687"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31823"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31882"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31900"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33714"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33786"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT3026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT3129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.citrix.com/article/CTX117991"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.citrix.com/article/CTX118183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.doxpara.com/?p=1176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.doxpara.com/DMK_BO2K8.ppt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/30131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020437"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020448"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020449"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020548"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020558"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020560"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020575"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020576"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020577"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020578"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020579"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020653"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020702"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020804"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vendorComments": [
{
"comment": "http://rhn.redhat.com/errata/RHSA-2008-0533.html",
"lastModified": "2008-07-09T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-331"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
VAR-200707-0675
Vulnerability from variot - Updated: 2024-07-23 20:51The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug.". plural DNS There is a vulnerability in the implementation that makes cache poisoning attacks easier. Recent research has found a more efficient method of cash poisoning than previously known. DNS As a cache server, PC Please note that there is a possibility of attack. Cash poisoning attack forged response This is done by sending a packet. query The source port of the packet query By changing the value randomly every time, the probability of a successful cache poisoning attack can be reduced.By cash poisoning attack DNS Fake cache server DNS Information can be cached and DNS Nodes using the cache server may be directed to fake sites. ISC (Internet Systems Consortiuim) BIND generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. Multiple vendors' implementations of the DNS protocol are prone to a DNS-spoofing vulnerability because the software fails to securely implement random values when performing DNS queries. Successfully exploiting this issue allows remote attackers to spoof DNS replies, allowing them to redirect network traffic and to launch man-in-the-middle attacks. This issue affects Microsoft Windows DNS Clients and Servers, ISC BIND 8 and 9, and multiple Cisco IOS releases; other DNS implementations may also be vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Cisco Security Advisory: Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks
Advisory ID: cisco-sa-20080708-dns
http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml
Revision 1.0
For Public Release 2008 July 08 1800 UTC (GMT)
Summary
Multiple Cisco products are vulnerable to DNS cache poisoning attacks due to their use of insufficiently randomized DNS transaction IDs and UDP source ports in the DNS queries that they produce, which may allow an attacker to more easily forge DNS answers that can poison DNS caches.
To exploit this vulnerability an attacker must be able to cause a vulnerable DNS server to perform recursive DNS queries. Therefore, DNS servers that are only authoritative, or servers where recursion is not allowed, are not affected.
Cisco has released free software updates that address this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml.
This security advisory is being published simultaneously with announcements from other affected organizations. Products that process DNS messages with the RD flag set will attempt to answer the question asked on behalf of the client. A product is only affected if using a vulnerable implementation of the DNS protocol, the DNS server functionality for the product is enabled, and the DNS feature for the product is configured to process recursive DNS query messages. For information about specific fixed versions, please refer to the Software Versions and Fixes section.
A device that is running Cisco IOS Software is configured to act
as a DNS server if the command "ip dns server" is present in the
configuration. This command is not enabled by default.
-
Cisco Network Registrar
All Cisco Network Registrar versions are affected, and DNS services are enabled by default.
The DNS server on CNR is enabled via the command-line interface (CLI) commands "server dns enable start-on-reboot" or "dns enable start-on-reboot" or via the web management interface in the Servers page by selecting the appropriate "Start," "Stop," or "Reload" button.
-
Cisco Application and Content Networking System
All Cisco Application and Content Networking System (ACNS) versions are affected; DNS services are disabled by default.
ACNS is configured to act as a DNS server if the command "dns enable" is present in the configuration.
-
Cisco Global Site Selector Used in Combination with Cisco Network Registrar
The Cisco Global Site Selector (GSS) is affected when it is used in combination with Cisco Network Registrar software to provide a more complete DNS solution. Fixed software would come in the form of an update of the Cisco Network Registrar software rather than an update of the GSS software.
Products Confirmed Not Vulnerable +--------------------------------
Products that do not offer DNS server capabilities are not affected by this vulnerability.
The Cisco GSS by itself is not affected by this vulnerability. However, it is affected when it is used with Cisco Network Registrar software.
No other Cisco products are currently known to be affected by these vulnerabilities.
Details
The Domain Name System is an integral part of networks that are based on TCP/IP such as the Internet. Simply stated, the Domain Name System is a hierarchical database that contains mappings of hostnames and IP addresses. When handling a query from a DNS client, a DNS server can look into its portion of the global DNS database (if the query is for a portion of the DNS database for which the DNS server is authoritative), or it can relay the query to other DNS servers (if it is configured to do so and if the query is for a portion of the DNS database for which the DNS server is not authoritative.)
Because of the processing time and bandwidth that is associated with handling a DNS query, most DNS servers locally store responses that are received from other DNS servers. If this happens, a user who is trying to visit www.example.com may end up contacting the wrong web server. The fundamental implementation weakness is that the DNS transaction ID and source port number used to validate DNS responses are not sufficiently randomized and can easily be predicted, which allows an attacker to create forged responses to DNS queries that will match the expected values. The DNS server will consider such responses to be valid.
The following Cisco products that offer DNS server functionality have been found to be susceptible to DNS cache poisoning attacks:
-
Cisco IOS Software: The vulnerability documented in Cisco bug ID CSCso81854.
-
Cisco Network Registrar: The vulnerability documented in Cisco bug ID CSCsq01298.
-
Cisco Application and Content Networking System (ACNS): The vulnerability documented in Cisco bug ID CSCsq21930.
This vulnerability has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2008-1447.
Vulnerability Scoring Details +----------------------------
Cisco has provided scores for the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding CVSS at
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at
http://intellishield.cisco.com/security/alertmanager/cvss
Cisco Bugs:
-
DNS cache prone to poisoning/forged answers attacks (CSCsq21930)
-
DNS susceptible to forged query response attacks (CSCsq01298)
-
Need to make DNS implementation more resilient against forged answers (CSCso81854)
CVSS Base Score - 6.4 Access Vector - Network Access Complexity - Low Authentication - None Confidentiality Impact - None Integrity Impact - Partial Availability Impact - Partial
CVSS Temporal Score - 5.3 Exploitability - Functional Remediation Level - Official-Fix Report Confidence - Confirmed
(same score for the three Cisco bugs listed above.)
Impact
Successful exploitation of the vulnerability described in this document may result in invalid hostname-to-IP address mappings in the cache of an affected DNS server. This may lead users of this DNS server to contact the wrong provider of network services. The ultimate impact varies greatly, ranging from a simple denial of service (for example, making www.example.com resolve to 127.0.0.1) to phishing and financial fraud.
Software Versions and Fixes
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance.
Cisco IOS Software +-----------------
Each row of the Cisco IOS Software table (below) names a Cisco IOS Software release train. If a given release train is vulnerable, then the earliest possible releases that contain the fix (along with the anticipated date of availability for each, if applicable) are listed in the "First Fixed Release" column of the table. The "Recommended Release" column indicates the releases which have fixes for all the published vulnerabilities at the time of this Advisory. A device running a release in the given train that is earlier than the release in a specific column (less than the First Fixed Release) is known to be vulnerable. Cisco recommends upgrading to a release equal to or later than the release in the "Recommended Releases" column of the table.
+----------------------------------------+ | Major | Availability of | | Release | Repaired Releases | |------------+---------------------------| | Affected | First Fixed | Recommended | | 12.0-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | 12.0 | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0DA | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(7)DB | | | | are | | | | vulnerable, | 12.4(19a) | | 12.0DB | release | | | | 12.0(7)DB | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(7)DC | | | | are | | | | vulnerable, | 12.4(19a) | | 12.0DC | release | | | | 12.0(7)DC | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.0S | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SP | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0ST | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0SZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.0T | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.0W | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0WC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.0WT | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XD | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Note: | | | | Releases | | | | prior to | | | | 12.0(7)XE1 | | | | are | | | 12.0XE | vulnerable, | | | | release | | | | 12.0(7)XE1 | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.0XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(7)XK2 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.0XK | release | | | | 12.0(7)XK2 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.0XL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XN | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.0(7)XR1 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.0XR | release | | | | 12.0(7)XR1 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.0XS | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.0XW | Not | | | | Vulnerable | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.1-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.1 | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.1AA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1AX | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(22)AY1 | | | | are | | | 12.1AY | vulnerable, | 12.1(22) | | | release | EA11 | | | 12.1(22)AY1 | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.1AZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1CX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1DA | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(4)DB1 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.1DB | release | | | | 12.1(4)DB1 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(4)DC2 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.1DC | release | | | | 12.1(4)DC2 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.1E | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(11)EA1 | | | | are | | | 12.1EA | vulnerable, | 12.1(22) | | | release | EA11 | | | 12.1(11)EA1 | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.1EB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EO | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EW | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Note: | | | | Releases | | | | prior to | | | | 12.1(8a)EX | | | | are | | | 12.1EX | vulnerable, | | | | release | | | | 12.1(8a)EX | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.1EY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1EZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1GA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1GB | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.1T | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.1XA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XB | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.1(1)XC1 | | | | are | | | | vulnerable, | 12.4(19a) | | 12.1XC | release | | | | 12.1(1)XC1 | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.1XD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XN | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XO | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XP | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XR | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XS | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XT | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1XZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YD | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Note: | | | | Releases | | | | prior to | | | | 12.1(5)YE1 | | | | are | 12.4(19a) | | 12.1YE | vulnerable, | | | | release | 12.4(19b) | | | 12.1(5)YE1 | | | | and later | | | | are not | | | | vulnerable; | | |------------+-------------+-------------| | 12.1YF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.1YJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.2-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2 | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2B | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2BC | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2BW | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.2(8)BY | | | | are | | | | vulnerable, | 12.4(19a) | | 12.2BY | release | | | | 12.2(8)BY | 12.4(19b) | | | and later | | | | are not | | | | vulnerable; | | | | first fixed | | | | in 12.4 | | |------------+-------------+-------------| | 12.2BZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2CX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2CY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2CZ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.2DA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2DD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2DX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EWA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2EZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2FX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2FY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2FZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2IXF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2JA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2JK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2MB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2MC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2S | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SBC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SCA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SED | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SEG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SGA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SO | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SRA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SRB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SRC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SVA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SVC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SVD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SXI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2SZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2T | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.2(8) | | | | TPC10d are | | | | vulnerable, | | | 12.2TPC | release | | | | 12.2(8) | | | | TPC10d and | | | | later are | | | | not | | | | vulnerable; | | |------------+-------------+-------------| | 12.2UZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XA | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XB | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XC | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2XD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XG | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2XH | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XI | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XK | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XL | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2XM | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XN | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XNA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XO | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XR | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XS | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XT | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2XU | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2XV | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2XW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YD | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YE | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YG | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YH | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YJ | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2YK | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YL | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YM | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YN | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.2(18) | | | migrate to | SXF15; | | 12.2YO | any release | Available | | | in 12.2SY | on | | | | 08-AUG-08 | |------------+-------------+-------------| | 12.2YP | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YR | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YS | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YT | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YU | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2YV | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2YW | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2YZ | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZA | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2ZB | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.2ZC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZD | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2ZE | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2ZF | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.2ZG | first fixed | | | | in 12.4T | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.2ZH | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.2ZJ | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.2ZL | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.2ZP | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZY | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.2ZYA | Not | | | | Vulnerable | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.3-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3 | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3B | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3BC | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3BW | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3EU | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JEA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JEB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JEC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JL | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.3JX | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3T | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3TPC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.3VA | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XA | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XB | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XC | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XD | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XE | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XF | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XG | first fixed | | | | in 12.4T | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XH | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3XI | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | | 12.3(14) | | | | YX12 | | | Vulnerable; | | | 12.3XJ | first fixed | 12.4(20)T; | | | in 12.3YX | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XK | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XQ | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3XR | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(19a) | | 12.3XS | first fixed | | | | in 12.4 | 12.4(19b) | |------------+-------------+-------------| | 12.3XU | Not | | | | Vulnerable | | |------------+-------------+-------------| | | | 12.3(14) | | | | YX12 | | | Vulnerable; | | | 12.3XW | first fixed | 12.4(20)T; | | | in 12.3YX | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.3XY | Not | | | | Vulnerable | | |------------+-------------+-------------| | | | 12.4(19a) | | | | | | | Vulnerable; | 12.4(19b) | | 12.3YA | first fixed | | | | in 12.4 | 12.4(20)T; | | | | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YD | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | | 12.3(14) | | | | YX12 | | | Vulnerable; | | | 12.3YF | first fixed | 12.4(20)T; | | | in 12.3YX | Available | | | | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YG | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YH | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YI | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.3YJ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YK | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Releases | | | | prior to | | | | 12.3(14) | | | | YM12 are | | | | vulnerable, | 12.3(14) | | 12.3YM | release | YM12 | | | 12.3(14) | | | | YM12 and | | | | later are | | | | not | | | | vulnerable; | | |------------+-------------+-------------| | 12.3YQ | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YS | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.3YT | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | | Vulnerable; | | | 12.3YU | first fixed | | | | in 12.4XB | | |------------+-------------+-------------| | 12.3YX | 12.3(14) | 12.3(14) | | | YX12 | YX12 | |------------+-------------+-------------| | 12.3YZ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | Affected | First Fixed | Recommended | | 12.4-Based | Release | Release | | Releases | | | |------------+-------------+-------------| | | 12.4(18b) | | | | | | | | 12.4(19a) | 12.4(19a) | | 12.4 | | | | | 12.4(19b) | 12.4(19b) | | | | | | | 12.4(21) | | |------------+-------------+-------------| | 12.4JA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JMA | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JMB | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JMC | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4JX | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4MD | 12.4(15)MD | 12.4(15)MD | |------------+-------------+-------------| | 12.4MR | 12.4(19)MR | 12.4(19)MR | |------------+-------------+-------------| | 12.4SW | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | 12.4(15)T6 | | | | | 12.4(20)T; | | 12.4T | 12.4(20)T; | Available | | | Available | on | | | on | 11-JUL-08 | | | 11-JUL-08 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.4XA | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.4XB | 12.4(2)XB10 | | |------------+-------------+-------------| | 12.4XC | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | | 12.4(4) | 12.4(20)T; | | | XD11; | Available | | 12.4XD | Available | on | | | on | 11-JUL-08 | | | 31-JUL-08 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.4XE | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.4XF | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XG | Not | | | | Vulnerable | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.4XJ | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | |------------+-------------+-------------| | 12.4XK | Not | | | | Vulnerable | | |------------+-------------+-------------| | 12.4XL | 12.4(15)XL2 | 12.4(15)XL2 | |------------+-------------+-------------| | 12.4XM | 12.4(15)XM1 | 12.4(15)XM1 | |------------+-------------+-------------| | 12.4XN | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XQ | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XT | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XV | Vulnerable; | | | | contact TAC | | |------------+-------------+-------------| | 12.4XW | 12.4(11)XW8 | 12.4(11)XW6 | |------------+-------------+-------------| | 12.4XY | 12.4(15)XY3 | | |------------+-------------+-------------| | | Vulnerable; | 12.4(20)T; | | 12.4XZ | first fixed | Available | | | in 12.4T | on | | | | 11-JUL-08 | +----------------------------------------+
Cisco Network Registrar +----------------------
+---------------------------------------+ | Affected | | | Release | First Fixed Release | | Train | | |--------------+------------------------| | 6.1.x | Contact TAC | |--------------+------------------------| | | 6.3.1.1 patch; | | 6.3.x | available mid-July | | | 2008 | |--------------+------------------------| | 7.0.x | 7.0.1; available in | | | mid-July 2008 | +---------------------------------------+
Cisco Network Registrar software is available for download at:
http://www.cisco.com/pcgi-bin/Software/Tablebuild/tablebuild.pl/nr-eval
Cisco Application and Content Networking System +----------------------------------------------
This issue is fixed in version 5.5.11 of Cisco ACNS software. This release will be available for download from www.cisco.com in late July 2008.
Cisco ACNS 5.5 software is available for download at:
http://www.cisco.com/pcgi-bin/tablebuild.pl/acns55
Workarounds
There are no workarounds.
Additional information about identification and mitigation of attacks against DNS is in the Cisco Applied Intelligence white paper "DNS Best Practices, Network Protections, and Attack Identification," available at http://www.cisco.com/web/about/security/intelligence/dns-bcp.html.
Obtaining Fixed Software
Cisco has released free software updates that address these vulnerabilities. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html, or as otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades.
Customers with Service Contracts +-------------------------------
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations +------------------------------------------------
Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed.
Customers without Service Contracts +----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows.
- +1 800 553 2447 (toll free from within North America)
- +1 408 526 7209 (toll call from anywhere in the world)
- e-mail: tac@cisco.com
Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC.
Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory. Cisco would like to thank Dan Kaminsky for notifying vendors about his findings.
Note that vulnerability information for Cisco IOS Software is being provided in this advisory outside of the announced publication schedule for Cisco IOS Software described at http://www.cisco.com/go/psirt due to industry-wide disclosure of the vulnerability.
Status of this Notice: FINAL
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory is posted on Cisco's worldwide website at
http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml
In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients.
- cust-security-announce@cisco.com
- first-teams@first.org
- bugtraq@securityfocus.com
- vulnwatch@vulnwatch.org
- cisco@spot.colorado.edu
- cisco-nsp@puck.nether.net
- full-disclosure@lists.grok.org.uk
- comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.
Revision History
+-----------------------------------------------------------+ | Revision 1.0 | 2008-July-08 | Initial public release | +-----------------------------------------------------------+
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.
+-------------------------------------------------------------------- Copyright 2007-2008 Cisco Systems, Inc. All rights reserved. +--------------------------------------------------------------------
Updated: Jul 08, 2008 Document ID: 107064
+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkhztUIACgkQ86n/Gc8U/uCAgACfVRRoJO4w4defnpwbNlfgBm4t 2SMAnjKCKECHtsjN9umqqPrPd2DW4IcC =XGZw -----END PGP SIGNATURE----- . This could be used to misdirect users and services; i.e. for web and email traffic (CVE-2008-1447).
This update provides the latest stable BIND releases for all platforms except Corporate Server/Desktop 3.0 and MNF2, which have been patched to correct the issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
Updated Packages:
Mandriva Linux 2007.1: 73cc24fc9586b7ab290d755012c16a79 2007.1/i586/bind-9.4.2-0.1mdv2007.1.i586.rpm 70867c50cfd64b4406aa002d627d740b 2007.1/i586/bind-devel-9.4.2-0.1mdv2007.1.i586.rpm 3603e9d9115466753397a1f472011703 2007.1/i586/bind-utils-9.4.2-0.1mdv2007.1.i586.rpm cf5e4100ecb21a4eb603831e5a6ec23d 2007.1/SRPMS/bind-9.4.2-0.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64: 4eb7ce0984d3ce3befff667392e3bf3e 2007.1/x86_64/bind-9.4.2-0.1mdv2007.1.x86_64.rpm d7b9a9e7d4c52a5b0c54f59ca20bf2d5 2007.1/x86_64/bind-devel-9.4.2-0.1mdv2007.1.x86_64.rpm c5c66c9609615029d2f07f7b09a63118 2007.1/x86_64/bind-utils-9.4.2-0.1mdv2007.1.x86_64.rpm cf5e4100ecb21a4eb603831e5a6ec23d 2007.1/SRPMS/bind-9.4.2-0.1mdv2007.1.src.rpm
Mandriva Linux 2008.0: 52dfe3970fcd9495b2bb9379a9312b25 2008.0/i586/bind-9.4.2-1mdv2008.0.i586.rpm 97d20d35b6814aa2f9fab549ca6237c0 2008.0/i586/bind-devel-9.4.2-1mdv2008.0.i586.rpm 87a7bb3dd25abd8cd882a8f2fdc2398e 2008.0/i586/bind-utils-9.4.2-1mdv2008.0.i586.rpm da4444a8074e6ede39dfa557fb258db7 2008.0/SRPMS/bind-9.4.2-1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: b9d0337363bc1e2b14505f25d4ee5f99 2008.0/x86_64/bind-9.4.2-1mdv2008.0.x86_64.rpm 9b75e2a96784c00c2912bc3bf333d089 2008.0/x86_64/bind-devel-9.4.2-1mdv2008.0.x86_64.rpm 0a593b090d9e6bda3666e234056e19ba 2008.0/x86_64/bind-utils-9.4.2-1mdv2008.0.x86_64.rpm da4444a8074e6ede39dfa557fb258db7 2008.0/SRPMS/bind-9.4.2-1mdv2008.0.src.rpm
Mandriva Linux 2008.1: 2534ef007262d4ea2d219bab0190466c 2008.1/i586/bind-9.5.0-3mdv2008.1.i586.rpm c3feee5d05aa3aee14cd70a2d295d0b1 2008.1/i586/bind-devel-9.5.0-3mdv2008.1.i586.rpm f306c06665b723a2530258e6d1dbdae2 2008.1/i586/bind-doc-9.5.0-3mdv2008.1.i586.rpm 967ef80628f92160930bc3a3827a216e 2008.1/i586/bind-utils-9.5.0-3mdv2008.1.i586.rpm 70fc7a7964944a2926979710c5148ed1 2008.1/SRPMS/bind-9.5.0-3mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: 3f4d96d7a7f913c141e1f63cdc7e7336 2008.1/x86_64/bind-9.5.0-3mdv2008.1.x86_64.rpm 420db658366763686198f41394aa72b3 2008.1/x86_64/bind-devel-9.5.0-3mdv2008.1.x86_64.rpm 6f3674f68311494c5a9ff0dbce831e82 2008.1/x86_64/bind-doc-9.5.0-3mdv2008.1.x86_64.rpm 4294b3a086b89bf53c5c967c17962447 2008.1/x86_64/bind-utils-9.5.0-3mdv2008.1.x86_64.rpm 70fc7a7964944a2926979710c5148ed1 2008.1/SRPMS/bind-9.5.0-3mdv2008.1.src.rpm
Corporate 3.0: de2a4372d1c25d73f343c9fcb044c9dd corporate/3.0/i586/bind-9.2.3-6.5.C30mdk.i586.rpm 1f24f6dbdb6c02e21cbbef99555049cb corporate/3.0/i586/bind-devel-9.2.3-6.5.C30mdk.i586.rpm 00405b98290d5a41f226081baa57e18d corporate/3.0/i586/bind-utils-9.2.3-6.5.C30mdk.i586.rpm 6a237dc290f4f7c463b1996e6a4a4515 corporate/3.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm
Corporate 3.0/X86_64: 628162f3d6a414828d2231fefc46842b corporate/3.0/x86_64/bind-9.2.3-6.5.C30mdk.x86_64.rpm dd29ff31a9cffcc1b20fd045869d7013 corporate/3.0/x86_64/bind-devel-9.2.3-6.5.C30mdk.x86_64.rpm c475c1a4d048e04da1fc27dcbb17c3f3 corporate/3.0/x86_64/bind-utils-9.2.3-6.5.C30mdk.x86_64.rpm 6a237dc290f4f7c463b1996e6a4a4515 corporate/3.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm
Corporate 4.0: 271ead204904be302d197cd542f5ae23 corporate/4.0/i586/bind-9.3.5-0.4.20060mlcs4.i586.rpm 42413dcc1cf053e735216f767eff4e5d corporate/4.0/i586/bind-devel-9.3.5-0.4.20060mlcs4.i586.rpm 0201afe493a41e1deedc9bf7e9725f4a corporate/4.0/i586/bind-utils-9.3.5-0.4.20060mlcs4.i586.rpm 86bc0cdc9ed1b959b6f56e0660268f2e corporate/4.0/SRPMS/bind-9.3.5-0.4.20060mlcs4.src.rpm
Corporate 4.0/X86_64: b1a18a7d0578dab7bd825eda6c682b3d corporate/4.0/x86_64/bind-9.3.5-0.4.20060mlcs4.x86_64.rpm 6a2ebd550feb9147058de05b1a1ef04d corporate/4.0/x86_64/bind-devel-9.3.5-0.4.20060mlcs4.x86_64.rpm 670a1b934ce4974b8505018ab69ade0b corporate/4.0/x86_64/bind-utils-9.3.5-0.4.20060mlcs4.x86_64.rpm 86bc0cdc9ed1b959b6f56e0660268f2e corporate/4.0/SRPMS/bind-9.3.5-0.4.20060mlcs4.src.rpm
Multi Network Firewall 2.0: 5b694c24cc2092e38f531dbfdd5c9d41 mnf/2.0/i586/bind-9.2.3-6.5.C30mdk.i586.rpm c08bc805027059c47bed32215f17eacb mnf/2.0/i586/bind-utils-9.2.3-6.5.C30mdk.i586.rpm 39225289516498e1b071c5059306f2b9 mnf/2.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIdPwTmqjQ0CJFipgRAm9AAJ9/UOAuOWDL1KgnMNGM/224QGUNQgCfW+G9 J7qxrU208lhOcIjhtq8FWX8= =91dV -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. When the destination address is a DNS port, it will allow remote attackers to bypass CVE-2008 -1447 security protection. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
VMware Security Advisory
Advisory ID: VMSA-2008-0014 Synopsis: Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues. Issue date: 2008-08-29 Updated on: 2008-08-29 (initial release of advisory) CVE numbers: CVE-2008-2101 CVE-2007-5269 CVE-2008-1447 CVE-2008-3691 CVE-2008-3692 CVE-2008-3693 CVE-2008-3694 CVE-2008-3695 CVE-2007-5438 CVE-2008-3696 CVE-2008-3697 CVE-2008-3698 CVE-2008-1806 CVE-2008-1807 CVE-2008-1808 CVE-2007-5503
-
Summary
Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.
-
Relevant releases
VMware Workstation 6.0.4 and earlier, VMware Workstation 5.5.7 and earlier, VMware Player 2.0.4 and earlier, VMware Player 1.0.7 and earlier, VMware ACE 2.0.4 and earlier, VMware ACE 1.0.6 and earlier, VMware Server 1.0.6 and earlier,
VMware ESX 3.0.3 without patches ESX303-200808404-SG, ESX303-200808403-SG ESX303-200808406-SG.
VMware ESX 3.0.2 without patches ESX-1005109, ESX-1005113, ESX-1005114.
VMware ESX 3.0.1 without patches ESX-1005108, ESX-1005112, ESX-1005111, ESX-1004823, ESX-1005117.
NOTE: Hosted products VMware Workstation 5.x, VMware Player 1.x, and VMware ACE 1.x will reach end of general support 2008-11-09. Customers should plan to upgrade to the latest version of their respective products.
Extended support (Security and Bug fixes) for ESX 3.0.2 ends on 10/29/2008 and Extended support for ESX 3.0.2 Update 1 ends on 8/8/2009. Users should plan to upgrade to ESX 3.0.3 and preferably to the newest release available. Extended Support (Security and Bug fixes) for ESX 3.0.1 has ended on 2008-07-31. -
Problem Description
I Security Issues
a. Setting ActiveX killbit
Starting from this release, VMware has set the killbit on its
ActiveX controls. Setting the killbit ensures that ActiveX
controls cannot run in Internet Explorer (IE), and avoids
security issues involving ActiveX controls in IE. See the
Microsoft KB article 240797 and the related references on this
topic.
Security vulnerabilities have been reported for ActiveX controls
provided by VMware when run in IE. Under specific circumstances,
exploitation of these ActiveX controls might result in denial-of-
service or can allow running of arbitrary code when the user
browses a malicious Web site or opens a malicious file in IE
browser. An attempt to run unsafe ActiveX controls in IE might
result in pop-up windows warning the user.
Note: IE can be configured to run unsafe ActiveX controls without
prompting. VMware recommends that you retain the default
settings in IE, which prompts when unsafe actions are
requested.
Earlier, VMware had issued knowledge base articles, KB 5965318 and
KB 9078920 on security issues with ActiveX controls. To avoid
malicious scripts that exploit ActiveX controls, do not enable
unsafe ActiveX objects in your browser settings. As a best
practice, do not browse untrusted Web sites as an administrator
and do not click OK or Yes if prompted by IE to allow certain
actions.
VMware would like to thank Julien Bachmann, Shennan Wang, Shinnai,
and Michal Bucko for reporting these issues to us.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
Workstation 6.x Windows 6.0.5 build 109488 or later
Workstation 6.x Linux not affected
Workstation 5.x Windows 5.5.8 build 108000 or later
Workstation 5.x Linux not affected
Player 2.x Windows 2.0.5 build 109488 or later
Player 2.x Linux not affected
Player 1.x Windows 1.0.8 build or later
Player 1.x Linux not affected
ACE 2.x Windows 2.0.5 build 109488 or later
ACE 1.x Windows 1.0.7 build 108880 or later
Server 1.x Windows 1.0.7 build 108231 or later
Server 1.x Linux not affected
Fusion 1.x Mac OS/X not affected
ESXi 3.5 ESXi not affected
ESX any ESX not affected
b. VMware ISAPI Extension Denial of Service
The Internet Server Application Programming Interface (ISAPI) is
an API that extends the functionality of Internet Information
Server (IIS). VMware uses ISAPI extensions in its Server product.
One of the ISAPI extensions provided by VMware is vulnerable to a
remote denial of service. By sending a malformed request, IIS
might shut down. IIS 6.0 restarts automatically. However, IIS 5.0
does not restart automatically when its Startup Type is set to
Manual.
VMware would like to thank the Juniper Networks J-Security
Security Research Team for reporting this issue to us.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
Workstation 6.x Windows not affected
Workstation 6.x Linux not affected
Workstation 5.x Windows not affected
Workstation 5.x Linux not affected
Player 2.x Windows not affected
Player 2.x Linux not affected
Player 1.x Windows not affected
Player 1.x Linux not affected
ACE 2.x Windows not affected
ACE 1.x Windows not affected
Server 1.x Windows 1.0.7 build 108231 or later
Server 1.x Linux not affected
Fusion 1.x Mac OS/X not affected
ESXi 3.5 ESXi not affected
ESX any ESX not affected
c. OpenProcess Local Privilege Escalation on Host System
This release fixes a privilege escalation vulnerability in host
systems. Exploitation of this vulnerability allows users to run
arbitrary code on the host system with elevated privileges.
VMware would like to thank Sun Bing from McAfee, Inc. for
reporting this issue to us.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
Workstation 6.x Windows not affected
Workstation 6.x Linux not affected
Workstation 5.x Windows 5.5.8 build 108000 or later
Workstation 5.x Linux not affected
Player 2.x Windows not affected
Player 2.x Linux not affected
Player 1.x Windows 1.0.8 build 109488 or later
Player 1.x Linux not affected
ACE 2.x Windows not affected
ACE 1.x Windows 1.0.7 build 108880 or later
Server 1.x Windows 1.0.7 build 108231 or later
Server 1.x Linux not affected
Fusion 1.x Mac OS/X not affected
ESXi 3.5 ESXi not affected
ESX any ESX not affected
d. Update to Freetype
FreeType 2.3.6 resolves an integer overflow vulnerability and other
vulnerabilities that can allow malicious users to run arbitrary code
or might cause a denial-of-service after reading a maliciously
crafted file. This release updates FreeType to 2.3.7.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
Workstation 6.x Windows not affected
Workstation 6.x Linux 6.0.5 build 109488 or later
Workstation 5.x Windows not affected
Workstation 5.x Linux 5.5.8 build 108000 or later
Player 2.x Windows not affected
Player 2.x Linux 2.0.5 build 109488 or later
Player 1.x Windows not affected
Player 1.x Linux 1.0.8 build 108000 or later
ACE 2.x Windows not affected
ACE 1.x Windows not affected
Server 1.x Windows not affected
Server 1.x Linux 1.0.7 build 108231 or later
Fusion 1.x Mac OS/X affected, patch pending
ESXi 3.5 ESXi not affected
ESX 3.5 ESX not affected
ESX 3.0.3 ESX not affected
ESX 3.0.2 ESX not affected
ESX 3.0.1 ESX not affected
ESX 2.5.5 ESX affected, patch pending
ESX 2.5.4 ESX affected, patch pending
e. Update to Cairo
Cairo 1.4.12 resolves an integer overflow vulnerability that can
allow malicious users to run arbitrary code or might cause a
denial-of-service after reading a maliciously crafted PNG file.
This release updates Cairo to 1.4.14.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
Workstation 6.x Windows not affected
Workstation 6.x Linux 6.0.5 build 109488 or later
Workstation 5.x Windows not affected
Workstation 5.x Linux not affected
Player 2.x Windows not affected
Player 2.x Linux 2.0.5 build 109488 or later
Player 1.x Windows not affected
Player 1.x Linux not affected
ACE 2.x Windows not affected
ACE 1.x Windows not affected
Server 1.x Windows not affected
Server 1.x Linux not affected
Fusion 1.x Mac OS/X affected, patch pending
ESXi 3.5 ESXi not affected
ESX any ESX not affected
f. VMware Consolidated Backup(VCB) command-line utilities may expose sensitive information
VMware Consolidated Backup command-line utilities accept the user
password through the -p command-line option. Users logged into the
service console could gain access to the username and password used
by VCB command-line utilities when such commands are running.
This patch resolves this issue by providing an alternative way of
passing the password used by VCB command-line utilities.
The following options are recommended for passing the password:
1. The password is specified in /etc/backuptools.conf
(PASSWORD=xxxxx), and -p is not used in the command line.
/etc/backuptools.conf file permissions are read/write only
for root.
2. No password is specified in /etc/backuptools.conf and the
-p option is not used in the command line. The user will be
prompted to enter a password.
ESX is not affected unless you use VCB.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= ===================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200806203-UG
ESX 3.0.3 ESX ESX303-200808403-SG
ESX 3.0.2 ESX ESX-1004824
ESX 3.0.1 ESX ESX-1004823
ESX 2.5.5 ESX not affected
ESX 2.5.4 ESX not affected
* hosted products are VMware Workstation, Player, ACE, Server, Fusion
g. Third Party Library libpng Updated to 1.2.29
Several flaws were discovered in the way third party library
libpng handled various PNG image chunks. An attacker could
create a carefully crafted PNG image file in such a way that
it causes an application linked with libpng to crash when the
file is manipulated.
NOTE: There are multiple patches required to remediate the issue.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= ===================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi affected, patch pending
ESX 3.5 ESX affected, patch pending
ESX 3.0.3 ESX ESX303-200808404-SG
ESX303-200808403-SG
ESX 3.0.2 ESX ESX-1005109 ESX-1005114 ESX-1005113
ESX 3.0.1 ESX ESX-1005112 ESX-1005108 ESX-1005111
ESX 2.5.5 ESX affected, patch pending
ESX 2.5.4 ESX affected, patch pending
* hosted products are VMware Workstation, Player, ACE, Server, Fusion
II ESX Service Console rpm updates
a. update to bind
This update upgrades the service console rpms for bind-utils and
bind-lib to version 9.2.4-22.el3.
Version 9.2.4.-22.el3 addresses the recently discovered
vulnerability in the BIND software used for Domain Name
resolution (DNS). Of the BIND packages, VMware only ships bind-util
and bind-lib in the service console and these components by
themselves cannot be used to setup a DNS server.
VMware explicitly discourages installing applications like BIND
on the service console. In case the customer has installed BIND,
and the DNS server is configured to support recursive queries,
their ESX Server system is affected and they should replace BIND
with a patched version.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= ===================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX patch pending
ESX 3.0.3 ESX ESX303-200808406-SG
ESX 3.0.2 ESX ESX-1006356
ESX 3.0.1 ESX ESX-1005117
ESX 2.5.5 ESX patch pending
ESX 2.5.4 ESX patch pending
* hosted products are VMware Workstation, Player, ACE, Server, Fusion
- Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
VMware Workstation 6.0.5
http://www.vmware.com/download/ws/ Release notes: http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
Windows binary md5sum: 46b4c54f0493f59f52ac6c2965296859
RPM Installation file for 32-bit Linux md5sum: 49ebfbd05d146ecc43262622ab746f03
tar Installation file for 32-bit Linux md5sum: 14ac93bffeee72528629d4caecc5ef37
RPM Installation file for 64-bit Linux md5sum: 0a856f1a1a31ba3c4b08bcf85d97ccf6
tar Installation file for 64-bit Linux md5sum: 3b459254069d663e9873a661bc97cf6c
VMware Workstation 5.5.8
http://www.vmware.com/download/ws/ws5.html Release notes: http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
Windows binary: md5sum: 745c3250e5254eaf6e65fcfc4172070f
Compressed Tar archive for 32-bit Linux md5sum: 65a454749d15d4863401619d7ff5566e
Linux RPM version for 32-bit Linux md5sum: d80adc73b1500bdb0cb24d1b0733bcff
VMware Player 2.0.5 and 1.0.8
http://www.vmware.com/download/player/ Release notes Player 1.x: http://www.vmware.com/support/player/doc/releasenotes_player.html Release notes Player 2.0 http://www.vmware.com/support/player2/doc/releasenotes_player2.html
2.0.5 Windows binary md5sum: 60265438047259b23ff82fdfe737f969
VMware Player 2.0.5 for Linux (.rpm) md5sum: 3bc81e203e947e6ca5b55b3f33443d34
VMware Player 2.0.5 for Linux (.tar) md5sum: f499603d790edc5aa355e45b9c5eae01
VMware Player 2.0.5 - 64-bit (.rpm) md5sum: 85bc2f11d06c362feeff1a64ee5a6834
VMware Player 2.0.5 - 64-bit (.tar) md5sum: b74460bb961e88817884c7e2c0f30215
1.0.8 Windows binary md5sum: e5f927304925297a7d869f74b7b9b053
Player 1.0.8 for Linux (.rpm) md5sum: a13fdb8d72b661cefd24e7dcf6e2a990
Player 1.0.8 for Linux (.tar) md5sum: 99fbe861253eec5308d8c47938e8ad1e
VMware ACE 2.0.5
http://www.vmware.com/download/ace/ Release notes 2.0: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
ACE Manager Server Virtual Appliance Virtual Appliance for the ACE Management Server md5sum: 41e7349f3b6568dffa23055bb629208d
ACE for Window 32-bit and 64-bit Main installation file for Windows 32-bit and 64-bit host (ACE Option Page key required for enabling ACE authoring) md5sum:46b4c54f0493f59f52ac6c2965296859
ACE Management Server for Windows ACE Management Server installation file for Windows md5sum:33a015c4b236329bcb7e12c82271c417
ACE Management Server for Red Hat Enterprise Linux 4 ACE Management Server installation file for Red Hat Enterprise Linux 4 md5sum:dc3bd89fd2285f41ed42f8b28cd5535f
ACE Management Server for SUSE Enterprise Linux 9 ACE Management Server installation file for SUSE Enterprise Linux 9 md5sum:2add6a4fc97e1400fb2f94274ce0dce0
VMware ACE 1.0.7
http://www.vmware.com/download/ace/ Release notes: http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html md5sum: 42d806cddb8e9f905722aeac19740f33
VMware Server 1.0.7
http://www.vmware.com/download/server/ Release notes: http://www.vmware.com/support/server/doc/releasenotes_server.html
VMware Server for Windows 32-bit and 64-bit md5sum: 2e2ee5ebe08ae48eac5e661cad01acf6
VMware Server Windows client package md5sum: ce7d906a5a8de37cbc20db4332de1adb
VMware Server for Linux md5sum: 04f201122b16222cd58fc81ca814ff8c
VMware Server for Linux rpm md5sum: 6bae706df040c35851823bc087597d8d
Management Interface md5sum: e67489bd2f23bcd4a323d19df4e903e8
VMware Server Linux client package md5sum: 99f1107302111ffd3f766194a33d492b
ESX
ESX 3.5.0 patch ESX350-200806203-UG (VCB) http://download3.vmware.com/software/esx/ESX350-200806203-UG.zip md5sum: 3bd512dc8aa2b276f7cfd19080d193c9 http://kb.vmware.com/kb/1005896
ESX 3.0.3 patch ESX303-200808403-SG (libpng) http://download3.vmware.com/software/vi/ESX303-200808403-SG.zip md5sum: 5f1e75631e53c0e9e013acdbe657cfc7 http://kb.vmware.com/kb/1006034
ESX 3.0.3 patch ESX303-200808404-SG (libpng) http://download3.vmware.com/software/vi/ESX303-200808404-SG.zip md5sum: 65468a5b6ba105cfde1dd444d77b2df4 http://kb.vmware.com/kb/1006035
ESX 3.0.3 patch ESX303-200808406-SG (bind) http://download3.vmware.com/software/vi/ESX303-200808406-SG.zip md5sum: a11273e8d430e5784071caff673995f4 http://kb.vmware.com/kb/1006357
ESX 3.0.3 patch (VCB)
ESX 3.0.2 patch ESX-1005109 (libpng) http://download3.vmware.com/software/vi/ESX-1005109.tgz md5sum: 456d74d94317f852024aed5d3852be09 http://kb.vmware.com/kb/1005109
ESX 3.0.2 patch ESX-1005113 (libpng) http://download3.vmware.com/software/vi/ESX-1005113.tgz md5sum: 5d604f2bfd90585b9c8679f5fc8c31b7 http://kb.vmware.com/kb/1005113
ESX 3.0.2 patch ESX-1005114 (libpng) http://download3.vmware.com/software/vi/ESX-1005114.tgz md5sum: 3b6d33b334f0020131580fdd8f9b5365 http://kb.vmware.com/kb/1005114
ESX 3.0.2 patch ESX-1004824 (VCB) http://download3.vmware.com/software/vi/ESX-1004824.tgz md5sum: c72b0132c9f5d7b4cb1b9e47748a9c5b http://kb.vmware.com/kb/1004824
ESX 3.0.2 patch ESX-1006356 (bind) http://download3.vmware.com/software/vi/ESX-1006356.tgz md5sum: f0bc9d0b641954145df3986cdb1c2bab http://kb.vmware.com/kb/1006356
ESX 3.0.1 patch ESX-1005111 (libpng) http://download3.vmware.com/software/vi/ESX-1005111.tgz md5sum: 60e1be9b41070b3531c06f9a0595e24c http://kb.vmware.com/kb/1005111
ESX 3.0.1 patch ESX-1005112 (libpng) http://download3.vmware.com/software/vi/ESX-1005112.tgz md5sum: ad645cef0f9fa18bb648ba5a37074732 http://kb.vmware.com/kb/1005112
ESX 3.0.1 patch ESX-1005108 (libpng) http://download3.vmware.com/software/vi/ESX-1005108.tgz md5sum: aabc873d978f023c929ccd9a54588ea5 http://kb.vmware.com/kb/1005108
ESX 3.0.1 patch ESX-1004823 (VCB) http://download3.vmware.com/software/vi/ESX-1004823.tgz md5sum: 5ff2e8ce50c18afca76fb16c28415a59 http://kb.vmware.com/kb/1004823
ESX 3.0.1 patch ESX-1005117 (bind) http://download3.vmware.com/software/vi/ESX-1005117.tgz md5sum: 5271ecc6e36fb6f1fdf372e57891aa33 http://kb.vmware.com/kb/1005117
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3693 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3694 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3695 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5438 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3696 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3697 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3698 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503
- Change log
2008-08-29 VMSA-2008-0014 initial release
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. All customers should test the updates / patch in their environment. HP is investigating changes to reduce the performance issues. This bulletin will be revised when new updates / patch become available. Effective attack techniques against these vulnerabilities have been demonstrated. Tools and techniques have been developed that can reliably poison a domain of the attacker's choosing on most current implementations. As a result, the consensus of DNS software implementers is to implement source port randomization in their resolvers as a mitigation.
II. Impact
An attacker with the ability to conduct a successful cache poisoning attack can cause a nameserver's clients to contact the incorrect, and possibly malicious, hosts for particular services. Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker's control.
III. Solution
Apply a patch from your vendor
Patches have been released by a number of vendors to implement source port randomization in the nameserver. Please see the Systems Affected section of Vulnerability Note VU#800113 for additional details for specific vendors.
As mentioned above, stub resolvers are also vulnerable to these attacks. Stub resolvers that will issue queries in response to attacker behavior, and may receive packets from an attacker, should be patched. System administrators should be alert for patches to client operating systems that implement port randomization in the stub resolver.
Workarounds
Restrict access Administrators, particularly those who are unable to apply a patch, can limit exposure to this vulnerability by restricting sources that can ask for recursion. Note that restricting access will still allow attackers with access to authorized hosts to exploit this vulnerability.
Filter traffic at network perimeters Because the ability to spoof IP addresses is necessary to conduct these attacks, administrators should take care to filter spoofed addresses at the network perimeter. IETF Request for Comments (RFC) documents RFC 2827, RFC 3704, and RFC 3013 describe best current practices (BCPs) for implementing this defense. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate.
Run a local DNS cache In lieu of strong port randomization characteristics in a stub resolver, administrators can protect their systems by using local caching full-service resolvers, both on the client systems and on servers that are topologically close on the network to the client systems. This should be done in conjunction with the network segmentation and filtering strategies mentioned above.
Disable recursion Disable recursion on any nameserver responding to DNS requests made by untrusted systems.
Implement source port randomization Vendors that implement DNS software are encouraged to review IETF Internet Draft, "Measures for making DNS more resilient against forged answers," for additional information about implementing mitigations in their products. This document is a work in progress and may change prior to its publication as an RFC, if it is approved.
IV. References
* US-CERT Vulnerability Note VU#800113 -
<http://www.kb.cert.org/vuls/id/800113>
* US-CERT Vulnerability Note VU#484649 -
<http://www.kb.cert.org/vuls/id/484649>
* US-CERT Vulnerability Note VU#252735 -
<http://www.kb.cert.org/vuls/id/252735>
* US-CERT Vulnerability Note VU#927905 -
<http://www.kb.cert.org/vuls/id/927905>
* US-CERT Vulnerability Note VU#457875 -
<http://www.kb.cert.org/vuls/id/457875>
* Internet Draft: Measures for making DNS more resilient against forged
answers -
<http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience>
* RFC 3833 - <http://tools.ietf.org/html/rfc3833>
* RFC 2827 - <http://tools.ietf.org/html/rfc2827>
* RFC 3704 - <http://tools.ietf.org/html/rfc3704>
* RFC 3013 - <http://tools.ietf.org/html/rfc3013>
* Microsoft Security Bulletin MS08-037 -
<http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx>
* Internet Systems Consortium BIND Vulnerabilities -
<http://www.isc.org/sw/bind/bind-security.php>
US-CERT thanks Dan Kaminsky of IOActive and Paul Vixie of Internet Systems Consortium (ISC) for notifying us about this problem and for helping us to construct this advisory.
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA08-190B.html>
Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA08-190B Feedback VU#800113" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2008 by US-CERT, a government organization.
Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications.
TITLE: Red Hat update for bind
SECUNIA ADVISORY ID: SA26195
VERIFY ADVISORY: http://secunia.com/advisories/26195/
CRITICAL: Moderately critical
IMPACT: Spoofing
WHERE:
From remote
OPERATING SYSTEM: Red Hat Enterprise Linux (v. 5 server) http://secunia.com/product/13652/ Red Hat Enterprise Linux Desktop (v. 5 client) http://secunia.com/product/13653/ Red Hat Enterprise Linux Desktop Workstation (v. 5 client) http://secunia.com/product/13651/ RedHat Enterprise Linux AS 2.1 http://secunia.com/product/48/ RedHat Enterprise Linux AS 3 http://secunia.com/product/2534/ RedHat Enterprise Linux AS 4 http://secunia.com/product/4669/ RedHat Enterprise Linux ES 2.1 http://secunia.com/product/1306/ RedHat Enterprise Linux ES 3 http://secunia.com/product/2535/ RedHat Enterprise Linux ES 4 http://secunia.com/product/4668/ RedHat Enterprise Linux WS 3 http://secunia.com/product/2536/ RedHat Enterprise Linux WS 2.1 http://secunia.com/product/1044/ RedHat Enterprise Linux WS 4 http://secunia.com/product/4670/ RedHat Linux Advanced Workstation 2.1 for Itanium http://secunia.com/product/1326/
DESCRIPTION: Red Hat has issued an update for bind.
For more information: SA26152
SOLUTION: Updated packages are available from Red Hat Network. http://rhn.redhat.com
ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2007-0740.html
OTHER REFERENCES: SA26152: http://secunia.com/advisories/26152/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Security Advisory (08-AUG-2008) (CVE-2008-3280) ===============================================
Ben Laurie of Google's Applied Security team, while working with an external researcher, Dr. Richard Clayton of the Computer Laboratory, Cambridge University, found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166).
In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Attack Description
In order to mount an attack against a vulnerable OP, the attacker first finds the private key corresponding to the weak TLS certificate. He then sets up a website masquerading as the original OP, both for the OpenID protocol and also for HTTP/HTTPS.
There are two cases, one is where the victim is a user trying to identify themselves, in which case, even if they use HTTPS to "ensure" that the site they are visiting is indeed their provider, they will be unable to detect the substitution and will give their login credentials to the attacker.
The second case is where the victim is the Relying Party (RP). In this case, even if the RP uses TLS to connect to the OP, as is recommended for higher assurance, he will not be defended, as the vast majority of OpenID implementations do not check CRLs, and will, therefore, accept the malicious site as the true OP.
Mitigation
Mitigation is surprisingly hard. In theory the vulnerable site should revoke their weak certificate and issue a new one.
However, since the CRLs will almost certainly not be checked, this means the site will still be vulnerable to attack for the lifetime of the certificate (and perhaps beyond, depending on user behaviour). Note that shutting down the site DOES NOT prevent the attack.
Therefore mitigation falls to other parties. Until either 1 and 2 or 3 have been done, OpenID cannot be trusted for any OP that cannot demonstrate it has never had a weak certificate.
Discussion
Normally, when security problems are encountered with a single piece of software, the responsible thing to do is to is to wait until fixes are available before making any announcement. However, as a number of examples in the past have demonstrated, this approach does not work particularly well when many different pieces of software are involved because it is necessary to coordinate a simultaneous release of the fixes, whilst hoping that the very large number of people involved will cooperate in keeping the vulnerability secret.
In the present situation, the fixes will involve considerable development work in adding CRL handling to a great many pieces of openID code. This is a far from trivial amount of work.
The fixes will also involve changes to browser preferences to ensure that CRLs are checked by default -- which many vendors have resisted for years. We are extremely pessimistic that a security vulnerability in OpenID will be seen as sufficiently important to change the browser vendors minds.
Hence, we see no value in delaying this announcement; and by making the details public as soon as possible, we believe that individuals who rely on OpenID will be better able to take their own individual steps to avoid relying upon the flawed certificates we have identified.
OpenID is at heart quite a weak protocol, when used in its most general form[1], and consequently there is very limited reliance upon its security. This means that the consequences of the combination of attacks that are now possible is nothing like as serious as might otherwise have been the case.
However, it does give an insight into the type of security disaster that may occur in the future if we do not start to take CRLs seriously, but merely stick them onto "to-do" lists or disable them in the name of tiny performance improvements.
Affected Sites
There is no central registry of OpenID systems, and so we cannot be sure that we have identified all of the weak certificates that are currently being served. The list of those we have found so far is:
openid.sun.com www.xopenid.net openid.net.nz
Notes
[1] There are ways of using OpenID that are significantly more secure than the commonly deployed scheme, I shall describe those in a separate article.
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
Release Date: 2008-07-16 Last Updated: 2010-10-12
Potential Security Impact: Remote DNS cache poisoning
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running BIND. HP-UX B.11.11, B.11.23, B.11.31 running BIND v9.3.2 or BIND v9.2.0, HP-UX B.11.11 running BIND v8.1.2
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2008-1447 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates / patch to resolve the vulnerabilities for BIND v9.2.0 and BIND v9.3.2.
Customers running BIND v8.1.2 on HP-UX B.11.11 should upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below.
A new BIND v9.2.0 depot is available to address an issue encountered on HP-UX B.11.11. The new depot is available by contacting HP Support. The patch PHNE_37865 is available from: http://itrc.hp.com
The BIND v9.3.2 updates are available for download from: http://software.hp.com
HP-UX Release / Action
B.11.11 running v8.1.2 Upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf.
HP-UX Release / BIND Depot name / Action
B.11.11 running v9.2.0 / BIND920V15.depot / Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf.
HP-UX Release / Action
B.11.23 running v9.2.0 / Install PHNE_37865; Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf.
HP-UX Release / Action
B.11.11 running v9.3.2 / Install revision C.9.3.2.7.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in
/etc/named.conf.
B.11.23 running v9.3.2 / Install revision C.9.3.2.7.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in
/etc/named.conf.
B.11.31 running v9.3.2 / Install revision C.9.3.2.3.0 or subsequent; Remove "query-source port" and "query-source-v6 port" options in
/etc/named.conf.
Note: Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf.
Note: Firewall configurations may need to be adjusted to allow DNS queries from random source ports to pass. In addition,
firewalls that forward DNS queries must not replace the random source ports.
MANUAL ACTIONS: Yes - NonUpdate Remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. Check firewall settings. For B.11.11 running v8.1.2, upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates For B.11.11 running v9.2.0 install BIND920v15.depot
PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It
analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can
also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
AFFECTED VERSIONS
For BIND v8.1.2 HP-UX B.11.11 ============= InternetSrvcs.INETSVCS-RUN action: upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf.
For BIND v9.3.2 HP-UX B.11.11 ============= BindUpgrade.BIND-UPGRADE action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com
HP-UX B.11.23
BindUpgrade.BIND-UPGRADE BindUpgrade.BIND2-UPGRADE action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com
HP-UX B.11.31
NameService.BIND-AUX NameService.BIND-RUN action: install revision C.9.3.2.7.0 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://software.hp.com
For BIND v9.2.0 HP-UX B.11.11 ============= BINDv920.INETSVCS-BIND action: install revision B.11.11.01.015 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL Contact HP Support for information on where to download depot.
HP-UX B.11.23
InternetSrvcs.INETSVCS-INETD InternetSrvcs.INETSVCS-RUN InternetSrvcs.INETSVCS2-RUN action: install patch PHNE_37865 or subsequent, remove "query-source port" and "query-source-v6 port" options in /etc/named.conf. URL: http://itrc.hp.com
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 16 July 2008 Initial release Version:2 (rev.2) - 19 July 2008 Added BIND v9.2.0 depot information Version:3 (rev.3) - 06 August 2008 Updated patch location, revised BIND v9.2.0 depot information, added BIND v8.1.2 Version:4 (rev.4) - 08 August 2008 Updated manual actions to include named.conf and firewall configuration setings Version:5 (rev.5) - 12 October 2010 Updated version for BIND v9.2.0 depot for B.11.11
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200707-0675",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "bind",
"scope": "eq",
"trust": 1.8,
"vendor": "isc",
"version": "8"
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "debian gnu linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "fujitsu",
"version": null
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "internet consortium",
"version": null
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "openwall gnu linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "red hat",
"version": null
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "suse linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "sun microsystems",
"version": null
},
{
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "ubuntu",
"version": null
},
{
"model": "rtx1100",
"scope": null,
"trust": 1.1,
"vendor": "yamaha",
"version": null
},
{
"model": "rtx1500",
"scope": null,
"trust": 1.1,
"vendor": "yamaha",
"version": null
},
{
"model": "aix",
"scope": "eq",
"trust": 1.1,
"vendor": "ibm",
"version": "6.1"
},
{
"model": "aix",
"scope": "eq",
"trust": 1.1,
"vendor": "ibm",
"version": "5.2"
},
{
"model": "rtx2000",
"scope": null,
"trust": 1.1,
"vendor": "yamaha",
"version": null
},
{
"model": "aix",
"scope": "eq",
"trust": 1.1,
"vendor": "ibm",
"version": "5.3"
},
{
"model": "rt300i",
"scope": null,
"trust": 1.1,
"vendor": "yamaha",
"version": null
},
{
"model": "rtx1000",
"scope": null,
"trust": 1.1,
"vendor": "yamaha",
"version": null
},
{
"model": "bind",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "9.2.9"
},
{
"model": "bind",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "4"
},
{
"model": "ios 12.4",
"scope": "ne",
"trust": 0.9,
"vendor": "cisco",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple computer",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "avaya",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "blue coat",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "bluecat",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "force10",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "freebsd",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "funkwerk",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "gentoo linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "infoblox",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "mandriva",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "microsoft",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nixu",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nominum",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nortel",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "novell",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "openbsd",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "qnx",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "secure computing network security division",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "slackware linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "wind river",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "dnsmasq",
"version": null
},
{
"model": "bind",
"scope": "eq",
"trust": 0.8,
"vendor": "isc",
"version": "9"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.4.11"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5 to v10.5.4"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.4.11"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5 to v10.5.4"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v1.1 to v2.0.2"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8624el"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8624ps"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8724sl"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8724sl v2"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8724xl"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8748sl"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8748xl"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8948xl"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9606sx/sc"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9606t"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9812t"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9816gb"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9924sp"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9924t/4sp"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9924ts"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar260s v2"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar410 v2"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar410s v2"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar415s"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar450s"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar550s"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar570s"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar740"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar740s"
},
{
"model": "switchblade4000",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"model": "id gateway",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.1"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86-64)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0 (x86-64)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(sparc)"
},
{
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(x86)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (sparc)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (x86)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "8 (sparc)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "8 (x86)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "9 (sparc)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "9 (x86)"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "12.0"
},
{
"model": "xr-1100",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.2 previous version"
},
{
"model": "xr-410",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.9 previous version"
},
{
"model": "xr-410-l2",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.1 previous version"
},
{
"model": "xr-440",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.7.7 previous version"
},
{
"model": "xr-510",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver3.5.3 previous version"
},
{
"model": "xr-540",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver3.5.2 previous version"
},
{
"model": "xr-640",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.7 previous version"
},
{
"model": "xr-640-l2",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.1 previous version"
},
{
"model": "xr-730",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver3.5.0 previous version"
},
{
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "1.0 (hosting)"
},
{
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "1.0 (workgroup)"
},
{
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "2.0"
},
{
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "3.0"
},
{
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "3.0 (x64)"
},
{
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10"
},
{
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10 (x64)"
},
{
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "11"
},
{
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "11 (x64)"
},
{
"model": "hp tru64 unix",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "v 5.1b-3"
},
{
"model": "hp tru64 unix",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "v 5.1b-4"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.11"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.23"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.31"
},
{
"model": "windows 2000",
"scope": null,
"trust": 0.8,
"vendor": "microsoft",
"version": null
},
{
"model": "windows server 2003",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "none"
},
{
"model": "windows server 2003",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64)"
},
{
"model": "windows xp",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64)"
},
{
"model": "windows xp",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "sp3"
},
{
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rt100i"
},
{
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt102i"
},
{
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt103i"
},
{
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt200i"
},
{
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt80i)"
},
{
"model": "rt105 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rt105i"
},
{
"model": "rt105 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt105e"
},
{
"model": "rt105 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt105p)"
},
{
"model": "rt107e",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"model": "rt140 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rt140i"
},
{
"model": "rt140 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt140e"
},
{
"model": "rt140 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt140p"
},
{
"model": "rt140 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt140f)"
},
{
"model": "rt58i",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"model": "rta series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rta55i"
},
{
"model": "rta series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rta54i"
},
{
"model": "rta series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rta52i"
},
{
"model": "rta series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rta50i)"
},
{
"model": "rtv series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rtv700"
},
{
"model": "rtv series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rtv01)"
},
{
"model": "rtw series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rt60w"
},
{
"model": "rtw series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rtw65i"
},
{
"model": "rtw series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rtw65b)"
},
{
"model": "rtx3000",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"model": "srt100",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (server)"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.0 (client)"
},
{
"model": "linux advanced workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1"
},
{
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (client)"
},
{
"model": "fitelnet-e series",
"scope": "eq",
"trust": 0.8,
"vendor": "furukawa electric",
"version": "fitelnet-e20/e30"
},
{
"model": "fitelnet-f series",
"scope": "eq",
"trust": 0.8,
"vendor": "furukawa electric",
"version": "fitelnet-f40"
},
{
"model": "fitelnet-f series",
"scope": "eq",
"trust": 0.8,
"vendor": "furukawa electric",
"version": "fitelnet-f80/f100/f120/f140/f1000/f2000"
},
{
"model": "ip38x series",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "ix1000 series",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "ix2000 series",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "ix3000 series",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": "ipcom series",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "netware sp1.1",
"scope": "eq",
"trust": 0.6,
"vendor": "novell",
"version": "6.5"
},
{
"model": "application \u0026 content networking software",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.6,
"vendor": "redhat",
"version": "5"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.6,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.6,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "linux advanced workstation",
"scope": "eq",
"trust": 0.6,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "windows xp home sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9-1"
},
{
"model": "ios 12.3b",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing cyberguard tsp",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "0"
},
{
"model": "bind a1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.5"
},
{
"model": "dnsmasq",
"scope": "eq",
"trust": 0.3,
"vendor": "dnsmasq",
"version": "2.35"
},
{
"model": "opensolaris build snv 95",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "networks adonis",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecat",
"version": "5.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.3.9"
},
{
"model": "networks pmbb",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.1"
},
{
"model": "rt140i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "tcp/ip services for openvms alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5.4"
},
{
"model": "rt105i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.11"
},
{
"model": "windows server datacenter edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "mpe/ix",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.0"
},
{
"model": "enterprise linux es ia64",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "netware sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.5"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2"
},
{
"model": "networks screenos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.1"
},
{
"model": "netbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "4.0"
},
{
"model": "windows server enterprise edition itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6"
},
{
"model": "ios 12.3yh",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.2zh",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "-par",
"scope": "ne",
"trust": 0.3,
"vendor": "pdnsd",
"version": "1.2.7"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.5"
},
{
"model": "windows xp professional edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4.3"
},
{
"model": "coat systems packetshaper",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "0"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"model": "ios 12.3xi",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1"
},
{
"model": "networks junose p0-2",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.3.5"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2"
},
{
"model": "-par",
"scope": "eq",
"trust": 0.3,
"vendor": "pdnsd",
"version": "1.2.2"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0.1"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.03"
},
{
"model": "bind p6",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.2"
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.17"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.2"
},
{
"model": "security gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "astaro",
"version": "7"
},
{
"model": "river systems linux",
"scope": "eq",
"trust": 0.3,
"vendor": "wind",
"version": "3.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.4"
},
{
"model": "mpe/ix",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6.5"
},
{
"model": "storage management appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.11.6"
},
{
"model": "ios 12.3xb",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "windows server enterprise edition itanium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "networks adonis",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecat",
"version": "4.1.43"
},
{
"model": "bind a5",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0.0.03"
},
{
"model": "rtx3000",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "messaging application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "0"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6.4"
},
{
"model": "network registar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1"
},
{
"model": "bind b3",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "ios 12.2zl",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1.02"
},
{
"model": "windows xp tablet pc edition sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "9.3"
},
{
"model": "bind b4",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "aix",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.3.7"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.3.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4.3"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "bind rc3",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.3"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.1"
},
{
"model": "solaris 8 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "vitalqip",
"scope": "eq",
"trust": 0.3,
"vendor": "lucent",
"version": "6.0"
},
{
"model": "vitalqip sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "lucent",
"version": "6.1"
},
{
"model": "ios 12.3xw",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.2"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0.0.02"
},
{
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.3.4"
},
{
"model": "windows server web edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "ipcop",
"scope": "ne",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.19"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"model": "bind -p1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.6"
},
{
"model": "netware",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "5.0"
},
{
"model": "access gateway standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "4.5.7"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "windows server sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "windows advanced server sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "matsumoto ruby -p229",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "ios 12.0wc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0xk",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "matsumoto ruby -p115",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "networks self-service ccss7",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "-0"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.04"
},
{
"model": "computing cyberguard classic",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "0"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.13"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.2"
},
{
"model": "matsumoto ruby -p286",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "9.1"
},
{
"model": "netware sp5",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "5.0"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "9.6.1"
},
{
"model": "opensolaris build snv 19",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "tcp/ip services for openvms integrity",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5.5"
},
{
"model": "netscaler build",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "8.157.3"
},
{
"model": "ios 12.3yx",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1.1"
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.11"
},
{
"model": "matsumoto ruby -p22",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "windows server datacenter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "matsumoto ruby -p230",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "access gateway standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "4.5.6"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1"
},
{
"model": "networks nsna switch",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "4070"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.3"
},
{
"model": "ios 12.1ay",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "rt105p",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "bind beta",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.3"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.5"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.3.2"
},
{
"model": "ios 12.2by",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "pardus",
"version": "20070"
},
{
"model": "bind 9.5.0a7",
"scope": null,
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"model": "networks self-service peri workstation",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "windows advanced server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "vitalqip",
"scope": "eq",
"trust": 0.3,
"vendor": "lucent",
"version": "6.2"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6.1"
},
{
"model": "ios 12.2b",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0.0.03"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.13.7"
},
{
"model": "networks optical software upgrade manager",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "bind b1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.7"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.4"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "8.0"
},
{
"model": "opensolaris build snv 89",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "windows server standard edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "ios 12.2xu",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.4"
},
{
"model": "ipcop",
"scope": "ne",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.20"
},
{
"model": "windows datacenter server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "bind 9.5.1b1",
"scope": "ne",
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "open-enterprise-server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "0"
},
{
"model": "coat systems packetshaper",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "8.4"
},
{
"model": "windows professional",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "rt102i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "bind a4",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.3.7"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "tcp/ip services for openvms alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5.5"
},
{
"model": "bind 9.5.0a6",
"scope": null,
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "networks adonis",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecat",
"version": "5.1.8"
},
{
"model": "rtv01",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "ios 12.2ze",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "9.4.3"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.3"
},
{
"model": "windows xp home sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "tcp/ip services for openvms integrity",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5.6"
},
{
"model": "networks ensm enterprise nms",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "-10.4"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.0"
},
{
"model": "ios 12.4xa",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.3xg",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "aix",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.1.1"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "network registar",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1.1"
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.10"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.1"
},
{
"model": "rta54i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "ios 12.3xc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "coat systems packetshaper",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "8.3.2"
},
{
"model": "windows server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "bind p2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.2"
},
{
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.1"
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "3"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4.1"
},
{
"model": "djbdns",
"scope": "ne",
"trust": 0.3,
"vendor": "djbdns",
"version": "0"
},
{
"model": "ios 12.3ys",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "4,0 beta",
"scope": null,
"trust": 0.3,
"vendor": "netbsd",
"version": null
},
{
"model": "matsumoto ruby pre1",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "9.6"
},
{
"model": "ios 12.4xl",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bind rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.7"
},
{
"model": "ios 12.4xt",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.1.1"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "7.3"
},
{
"model": "windows server standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "networks adonis",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecat",
"version": "5.1.1"
},
{
"model": "multi network firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "2.0"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.2"
},
{
"model": "bind a1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "net-dns/dnsmasq",
"scope": "eq",
"trust": 0.3,
"vendor": "gentoo",
"version": "2.43"
},
{
"model": "bind p7",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.2"
},
{
"model": "ios 12.2xc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bind rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.7"
},
{
"model": "networks self-service mps",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "1000"
},
{
"model": "windows advanced server",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "1"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4.1"
},
{
"model": "tcp/ip services for openvms alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5.6"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.4"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "windows xp media center edition sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.3"
},
{
"model": "windows xp tablet pc edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.14"
},
{
"model": "ios 12.2t",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.4"
},
{
"model": "ios 12.2xg",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "mpe/ix",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "7.5"
},
{
"model": "rt200i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "ios 12.3xh",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "windows server enterprise edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.6"
},
{
"model": "bind p1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.2"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0"
},
{
"model": "bind 9.4.3b2",
"scope": "ne",
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"model": "windows server sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.8"
},
{
"model": "bind p5",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.2"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.4"
},
{
"model": "coat systems director",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "0"
},
{
"model": "windows server standard edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows xp media center edition",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "linux enterprise sdk sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "networks junose",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "7.1.1"
},
{
"model": "windows server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "opensolaris build snv 88",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "rt58i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"model": "networks junose",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "0"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6.1"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.02"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1"
},
{
"model": "networks adonis",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecat",
"version": "5.0.5"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.3"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.2"
},
{
"model": "networks optical ambb",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.2"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.9"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"model": "bind -p2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.2"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.4"
},
{
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "coat systems ishaper",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "0"
},
{
"model": "freebsd",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "7.0"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.14"
},
{
"model": "networks junose p0-1",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "7.1"
},
{
"model": "nios",
"scope": "eq",
"trust": 0.3,
"vendor": "infoblox",
"version": "4"
},
{
"model": "ios 12.3yd",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "windows datacenter server sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "financials server",
"scope": "eq",
"trust": 0.3,
"vendor": "navision",
"version": "3.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "8.0"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "8.1"
},
{
"model": "openbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "openbsd",
"version": "4.2"
},
{
"model": "bind rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.3"
},
{
"model": "networks optical rmbb",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.1"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.1"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4.7"
},
{
"model": "windows advanced server sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "ios 12.3ym",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.3"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.1.2"
},
{
"model": "ios 12.4mr",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bind 9.5.0a3",
"scope": null,
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "messaging application server mm",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "networks optical application platform",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.2"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.0.1"
},
{
"model": "-par",
"scope": "eq",
"trust": 0.3,
"vendor": "pdnsd",
"version": "1.2.3"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.9"
},
{
"model": "enterprise manager",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "1.6"
},
{
"model": "solaris 8 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.3.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "solaris 10 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.17.6"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.2"
},
{
"model": "networks screenos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.2"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6.3"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "windows professional sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "networks srg",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "1.0"
},
{
"model": "appliance platform linux service",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "networks optical fmbb",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "ios 12.4xn",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.3xe",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "networks self-service mps",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5000"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2"
},
{
"model": "bind 9.3.5-p2",
"scope": "ne",
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "ios 12.1ea",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "tru64 unix b-3",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5.1.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.1.1"
},
{
"model": "ios 12.3xf",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bind 9.5.0b2",
"scope": null,
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.4xv"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4"
},
{
"model": "netware sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.0"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.3"
},
{
"model": "ios 12.3yt",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "cns network registrar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.1.3"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.6"
},
{
"model": "opensolaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.1"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.02"
},
{
"model": "windows xp home",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "ios 12.3xk",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.1db",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "windows server web edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "9"
},
{
"model": "windows professional sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.3"
},
{
"model": "rt107e",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "windows server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.3.3"
},
{
"model": "hp-ux b.11.11",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.3.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.8"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.1"
},
{
"model": "windows advanced server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.4"
},
{
"model": "bind a2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.1"
},
{
"model": "gnu/*/linux 2.0-stable",
"scope": null,
"trust": 0.3,
"vendor": "openwall",
"version": null
},
{
"model": "ios 12.4xz",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "novell linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "firepass",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "5.5"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6.2"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.3"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.2"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.1"
},
{
"model": "network registar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.1"
},
{
"model": "windows server itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6"
},
{
"model": "wanjet",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "5.0.2"
},
{
"model": "ios 12.2zd",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "srt100",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "ios 12.1ex",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "netscaler build",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "8.047.8"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"model": "ios 12.3yi",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "vitalqip",
"scope": "eq",
"trust": 0.3,
"vendor": "lucent",
"version": "7.x"
},
{
"model": "ios 12.3xq",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0xe",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.4xe",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "rt103i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "windows server itanium sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "dns library pydns",
"scope": "eq",
"trust": 0.3,
"vendor": "python",
"version": "2.3"
},
{
"model": "windows xp home sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "vitalqip",
"scope": "eq",
"trust": 0.3,
"vendor": "lucent",
"version": "5.2"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4.6"
},
{
"model": "ios 12.0xr",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "networks multimedia comm mcs5100",
"scope": null,
"trust": 0.3,
"vendor": "nortel",
"version": null
},
{
"model": "bind a3",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "siparator",
"scope": "ne",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.4"
},
{
"model": "ios 12.4t",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.13"
},
{
"model": "ios 12.2yn",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "networks junos 8.5.r1",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "aix",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.3.9"
},
{
"model": "ios 12.2bw",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.2xl",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0.0.01"
},
{
"model": "3.1 rc3",
"scope": null,
"trust": 0.3,
"vendor": "netbsd",
"version": null
},
{
"model": "windows server datacenter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "ipod touch",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "2.1"
},
{
"model": "opensolaris build snv 01",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "bind rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "opensolaris build snv 92",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "rt80i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "2"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.5"
},
{
"model": "ios 12.3xd",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.3va",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.1"
},
{
"model": "hp-ux b.11.23",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "linux enterprise desktop sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.6"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1.0.01"
},
{
"model": "networks bcm",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "200"
},
{
"model": "ios 12.2yv",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "windows server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.10"
},
{
"model": "-current",
"scope": null,
"trust": 0.3,
"vendor": "openbsd",
"version": null
},
{
"model": "network registar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.0"
},
{
"model": "-par",
"scope": "eq",
"trust": 0.3,
"vendor": "pdnsd",
"version": "1.2.4"
},
{
"model": "rt100i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "networks junose p0-1",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6.1.3"
},
{
"model": "dns one appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "infoblox",
"version": "2"
},
{
"model": "bind -p1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.2"
},
{
"model": "coat systems proxysg",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "5.2.4.3"
},
{
"model": "ios 12.4xd",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "networks self-service ccxml",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "9.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.3.6"
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.12"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.10"
},
{
"model": "firepass",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "6.0.2"
},
{
"model": "windows xp tablet pc edition",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "ios 12.4md",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.1.7"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "pardus",
"version": "20080"
},
{
"model": "windows server enterprise edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "networks self-service peri application",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "network registar",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "7.0.1"
},
{
"model": "linux enterprise sdk 10.sp1",
"scope": null,
"trust": 0.3,
"vendor": "suse",
"version": null
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.01"
},
{
"model": "coat systems ishaper",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "8.3.2"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"model": "matsumoto ruby pre4",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "windows xp professional edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "x64"
},
{
"model": "nonstop server",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "6"
},
{
"model": "-par",
"scope": "eq",
"trust": 0.3,
"vendor": "pdnsd",
"version": "1.2.1"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4.2"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.12"
},
{
"model": "netware sp6",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.5"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "netware sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.5"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1.1.01"
},
{
"model": "netware",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.0"
},
{
"model": "hat enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "matsumoto ruby -p71",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "ios 12.3bw",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0.0.04"
},
{
"model": "ios 12.3yf",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "iphone",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "2.1"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.6"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "9.3.1"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.8"
},
{
"model": "ios 12.3yz",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.3yg",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.2zg",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "windows xp professional sp3",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "ios 12.2yt",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.1"
},
{
"model": "firewall",
"scope": "ne",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.4"
},
{
"model": "ios 12.3t",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.3xs",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.15"
},
{
"model": "open enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "0"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0.0.01"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6.3"
},
{
"model": "firepass",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "5.5.2"
},
{
"model": "bind 9.5.0b1",
"scope": null,
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "9.4"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "bind b1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.3"
},
{
"model": "cns network registrar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.1.2"
},
{
"model": "netware sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.5"
},
{
"model": "access gateway standard edition rev a",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "4.5.7"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.3"
},
{
"model": "bind 9.5.0a5",
"scope": null,
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "windows xp tablet pc edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "linux enterprise server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "ios 12.4xj",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "software vantio",
"scope": "eq",
"trust": 0.3,
"vendor": "nominum",
"version": "3"
},
{
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "7.0"
},
{
"model": "firepass",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "6.0"
},
{
"model": "ios",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "12.4(21)"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.5"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.5"
},
{
"model": "rta50i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "appliance platform linux service",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "2"
},
{
"model": "ios 12.4xc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "11.0"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.2"
},
{
"model": "matsumoto ruby -p230",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "application \u0026 content networking software",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "5.5.11"
},
{
"model": "network registar",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3.1.5"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "10.1"
},
{
"model": "networks adonis",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecat",
"version": "5.0.2.8"
},
{
"model": "networks junose p0-7",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "7.0.1"
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.18"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.13"
},
{
"model": "ios 12.2yu",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "10.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.10"
},
{
"model": "windows datacenter server sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.7"
},
{
"model": "windows datacenter server",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "rt60w",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6.2"
},
{
"model": "windows xp professional sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "rt57i",
"scope": null,
"trust": 0.3,
"vendor": "yamaha",
"version": null
},
{
"model": "windows server itanium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "windows server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "cns network registrar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.1.1"
},
{
"model": "bind rc3",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.7"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.1.3"
},
{
"model": "matsumoto ruby -p114",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "linux lts lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "networks ensm enterprise nms",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "-10.5"
},
{
"model": "rt140p",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "ios 12.2xk",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.1"
},
{
"model": "matsumoto ruby -p287",
"scope": "ne",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "messaging application server mm",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.1"
},
{
"model": "aix",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.3.8"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.15"
},
{
"model": "wanjet",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "5.0"
},
{
"model": "linux enterprise desktop sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6.4"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.6"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1.10"
},
{
"model": "enterprise manager",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "1.2"
},
{
"model": "enterprise linux ws ia64",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0.0.02"
},
{
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "matsumoto ruby -p2",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.7"
},
{
"model": "cns network registrar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.1.4"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.11"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0"
},
{
"model": "bind rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.3"
},
{
"model": "bind b",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3.3"
},
{
"model": "hp-ux b.11.31",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "3,1 rc1",
"scope": null,
"trust": 0.3,
"vendor": "netbsd",
"version": null
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.9"
},
{
"model": "networks self-service web centric ccxml",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": null
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.5"
},
{
"model": "access gateway standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "4.5"
},
{
"model": "bind -p1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4.1"
},
{
"model": "netware",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.5"
},
{
"model": "dnsmasq",
"scope": "eq",
"trust": 0.3,
"vendor": "dnsmasq",
"version": "2.4.1"
},
{
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.04"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6.3"
},
{
"model": "cns network registrar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.1"
},
{
"model": "ios 12.3yu",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "networks self-service mps",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "10000"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9-2"
},
{
"model": "networks junose",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "7.0.2"
},
{
"model": "tru64 unix b-4",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "5.1.0"
},
{
"model": "ios 12.3xa",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.4"
},
{
"model": "netware sp5",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.5"
},
{
"model": "networks trail manager route advisor",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "matsumoto ruby pre2",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "ios 12.4xb",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "solaris 9 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "opensolaris build snv 02",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "coat systems director",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "5.2.2.5"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "enterprise manager",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "1.4.1"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.1.1"
},
{
"model": "networks junos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "8.4"
},
{
"model": "ios 12.4xw",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "access gateway advanced edition",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "4.5"
},
{
"model": "windows datacenter server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "netware sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.5"
},
{
"model": "netware sp7",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.7"
},
{
"model": "bind b1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "computing sidewinder g2",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "6.1.0.01"
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "4"
},
{
"model": "ios 12.4xm",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "rt105e",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "ios 12.4sw",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "rt140f",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"model": "firepass",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "6.0.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.5"
},
{
"model": "ios 12.3yk",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "vitalqip",
"scope": "eq",
"trust": 0.3,
"vendor": "lucent",
"version": "6.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.4"
},
{
"model": "windows professional sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.12"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5"
},
{
"model": "rt56v",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "rtv700",
"scope": null,
"trust": 0.3,
"vendor": "yamaha",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.0"
},
{
"model": "netware sp6",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "5.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.5.7"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0.2"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0"
},
{
"model": "windows xp professional",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.3"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "10.0"
},
{
"model": "netware sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.0"
},
{
"model": "bind b2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "9.4.5"
},
{
"model": "networks junose",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6.0.4"
},
{
"model": "ios 12.2xt",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "rtw65i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "ios 12.1xc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "netbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "3.0.2"
},
{
"model": "bind p4",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.2"
},
{
"model": "gnu/*/linux 2.0-current",
"scope": null,
"trust": 0.3,
"vendor": "openwall",
"version": null
},
{
"model": "bind -p1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4.7"
},
{
"model": "aix",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.1.2"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "networks self-service wvads",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "2.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4.0"
},
{
"model": "secure name server",
"scope": "eq",
"trust": 0.3,
"vendor": "nixu",
"version": "1"
},
{
"model": "matsumoto ruby pre3",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "windows server web edition sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "ios 12.2yo",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "river systems linux",
"scope": "eq",
"trust": 0.3,
"vendor": "wind",
"version": "0"
},
{
"model": "coat systems proxysg",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "4.2.8.7"
},
{
"model": "ios 12.4xq",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "11.0"
},
{
"model": "windows xp",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "0"
},
{
"model": "messaging application server mm",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.0"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "12.1"
},
{
"model": "ios 12.2zj",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.9"
},
{
"model": "netbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "3.0.1"
},
{
"model": "linux enterprise server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "software caching name server",
"scope": "eq",
"trust": 0.3,
"vendor": "nominum",
"version": "3"
},
{
"model": "ios 12.2yl",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "windows xp media center edition sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "advanced workstation for the itanium processor ia64",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.0"
},
{
"model": "netbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "3.1"
},
{
"model": "rta55i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "hat enterprise linux as ia64",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "2.1"
},
{
"model": "bind rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "windows server datacenter edition itanium",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "20030"
},
{
"model": "ios 12.3xj",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "messaging application server mm",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"model": "matsumoto ruby -p72",
"scope": "ne",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.14"
},
{
"model": "coat systems proxyra",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "0"
},
{
"model": "coat systems proxyra",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "2.3.2.1"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.1.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.7"
},
{
"model": "linux -current",
"scope": null,
"trust": 0.3,
"vendor": "slackware",
"version": null
},
{
"model": "ios 12.1ye",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4.5"
},
{
"model": "networks self-service speech server",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "hat enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "bind a2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.5"
},
{
"model": "bind a6",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.4"
},
{
"model": "opensolaris build snv 22",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "bind 9.5.0a4",
"scope": null,
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0"
},
{
"model": "3-dns",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.6.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "1.2-par",
"scope": null,
"trust": 0.3,
"vendor": "pdnsd",
"version": null
},
{
"model": "ios 12.3xr",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "current",
"scope": null,
"trust": 0.3,
"vendor": "netbsd",
"version": null
},
{
"model": "windows server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "coat systems director",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "4.2.2.4"
},
{
"model": "ios 12.2ym",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "networks nsna switch",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "4050"
},
{
"model": "ios 12.0t",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "netware sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "6.0"
},
{
"model": "rta52i",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "networks adonis",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecat",
"version": "5.0"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.11"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3.0"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1.0.02"
},
{
"model": "computing sidewinder g2",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "6.1.0.02"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.4.4"
},
{
"model": "windows server standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "ios 12.2cz",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.1t",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "enterprise linux desktop workstation client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "ios 12.2zf",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "bind 9.5.0-p2",
"scope": "ne",
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "beta2",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "4.0"
},
{
"model": "rtw65b",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.1"
},
{
"model": "advanced workstation for the itanium processor",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "windows server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003x64"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.7"
},
{
"model": "opensolaris build snv 13",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "netware",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "5.1"
},
{
"model": "bind p3",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.2"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "openbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "openbsd",
"version": "4.3"
},
{
"model": "opensolaris build snv 91",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "ios 12.3tpc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1.0.01"
},
{
"model": "novell linux pos",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9"
},
{
"model": "netware sp5",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "5.1"
},
{
"model": "bind -p2",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.2.6"
},
{
"model": "opensolaris build snv 64",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "net-dns/dnsmasq",
"scope": "ne",
"trust": 0.3,
"vendor": "gentoo",
"version": "2.45"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.3"
},
{
"model": "networks junose p0-6",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6.0.3"
},
{
"model": "windows xp media center edition sp1",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "netware sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "5.1"
},
{
"model": "windows professional sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.2.6"
},
{
"model": "ipcop",
"scope": "eq",
"trust": 0.3,
"vendor": "ipcop",
"version": "1.4.16"
},
{
"model": "solaris 10 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.03"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.3"
},
{
"model": "ios 12.3ya",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "networks self service voicexml",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "ios 12.4xy",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "cns network registrar",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1"
},
{
"model": "rt140e",
"scope": "eq",
"trust": 0.3,
"vendor": "yamaha",
"version": "0"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.01"
},
{
"model": "windows xp professional sp2",
"scope": null,
"trust": 0.3,
"vendor": "microsoft",
"version": null
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "9.1.3"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.7"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10.3"
},
{
"model": "-par",
"scope": "eq",
"trust": 0.3,
"vendor": "pdnsd",
"version": "1.2.6"
},
{
"model": "freebsd",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.3"
},
{
"model": "coat systems proxysg",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "0"
},
{
"model": "networks optical trail manager",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "0"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"model": "solaris 9 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "bind 9.4.2-p2",
"scope": "ne",
"trust": 0.3,
"vendor": "isc",
"version": null
},
{
"model": "ios 12.2xb",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.2zb",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.0db",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "networks adonis",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecat",
"version": "5.1.7"
},
{
"model": "computing sidewinder software",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1.02"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1.1.01"
},
{
"model": "windows server datacenter edition sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.0.0.04"
},
{
"model": "ios 12.0dc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "windows server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
},
{
"model": "ios 12.2tpc",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "matsumoto ruby -p231",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "bind",
"scope": "eq",
"trust": 0.3,
"vendor": "isc",
"version": "8.3.1"
},
{
"model": "ios 12.2yj",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.7"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "windows server datacenter edition itanium sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2003"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.4"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.1.0.02"
},
{
"model": "matsumoto ruby -p21",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "bigip",
"scope": "eq",
"trust": 0.3,
"vendor": "f5",
"version": "4.5.9"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1"
},
{
"model": "windows server",
"scope": "eq",
"trust": 0.3,
"vendor": "microsoft",
"version": "2000"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#252735"
},
{
"db": "BID",
"id": "30131"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Dan Kaminsky",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
}
],
"trust": 0.6
},
"cve": "CVE-2008-1447",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.4,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2008-1447",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-31572",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2008-1447",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"impactScore": 4.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2008-1447",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#800113",
"trust": 0.8,
"value": "27.54"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#252735",
"trust": 0.8,
"value": "3.83"
},
{
"author": "CNNVD",
"id": "CNNVD-200807-129",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-31572",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2008-1447",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#252735"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "VULMON",
"id": "CVE-2008-1447"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\". plural DNS There is a vulnerability in the implementation that makes cache poisoning attacks easier. Recent research has found a more efficient method of cash poisoning than previously known. DNS As a cache server, PC Please note that there is a possibility of attack. Cash poisoning attack forged response This is done by sending a packet. query The source port of the packet query By changing the value randomly every time, the probability of a successful cache poisoning attack can be reduced.By cash poisoning attack DNS Fake cache server DNS Information can be cached and DNS Nodes using the cache server may be directed to fake sites. ISC (Internet Systems Consortiuim) BIND generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. Multiple vendors\u0027 implementations of the DNS protocol are prone to a DNS-spoofing vulnerability because the software fails to securely implement random values when performing DNS queries. \nSuccessfully exploiting this issue allows remote attackers to spoof DNS replies, allowing them to redirect network traffic and to launch man-in-the-middle attacks. \nThis issue affects Microsoft Windows DNS Clients and Servers, ISC BIND 8 and 9, and multiple Cisco IOS releases; other DNS implementations may also be vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nCisco Security Advisory: Multiple Cisco Products Vulnerable to DNS Cache\nPoisoning Attacks\n\nAdvisory ID: cisco-sa-20080708-dns\n\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml\n\nRevision 1.0\n\nFor Public Release 2008 July 08 1800 UTC (GMT)\n\nSummary\n=======\n\nMultiple Cisco products are vulnerable to DNS cache poisoning attacks\ndue to their use of insufficiently randomized DNS transaction IDs and\nUDP source ports in the DNS queries that they produce, which may allow\nan attacker to more easily forge DNS answers that can poison DNS caches. \n\nTo exploit this vulnerability an attacker must be able to cause a\nvulnerable DNS server to perform recursive DNS queries. Therefore, DNS\nservers that are only authoritative, or servers where recursion is not\nallowed, are not affected. \n\nCisco has released free software updates that address this vulnerability. \n\nThis advisory is posted at\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml. \n\nThis security advisory is being published simultaneously with\nannouncements from other affected organizations. \nProducts that process DNS messages with the RD flag set will attempt to\nanswer the question asked on behalf of the client. A product is only\naffected if using a vulnerable implementation of the DNS protocol, the\nDNS server functionality for the product is enabled, and the DNS feature\nfor the product is configured to process recursive DNS query messages. For information about specific fixed\n versions, please refer to the Software Versions and Fixes section. \n\n A device that is running Cisco IOS Software is configured to act\n as a DNS server if the command \"ip dns server\" is present in the\n configuration. This command is not enabled by default. \n\n * Cisco Network Registrar\n\n All Cisco Network Registrar versions are affected, and DNS services\n are enabled by default. \n\n The DNS server on CNR is enabled via the command-line interface\n (CLI) commands \"server dns enable start-on-reboot\" or \"dns enable\n start-on-reboot\" or via the web management interface in the Servers\n page by selecting the appropriate \"Start,\" \"Stop,\" or \"Reload\"\n button. \n\n * Cisco Application and Content Networking System\n\n All Cisco Application and Content Networking System (ACNS) versions\n are affected; DNS services are disabled by default. \n\n ACNS is configured to act as a DNS server if the command\n \"dns enable\" is present in the configuration. \n\n * Cisco Global Site Selector Used in Combination with Cisco Network\n Registrar\n\n The Cisco Global Site Selector (GSS) is affected when it is used in\n combination with Cisco Network Registrar software to provide a more\n complete DNS solution. Fixed software would come in the form of an\n update of the Cisco Network Registrar software rather than an update\n of the GSS software. \n\nProducts Confirmed Not Vulnerable\n+--------------------------------\n\nProducts that do not offer DNS server capabilities are not affected by\nthis vulnerability. \n\nThe Cisco GSS by itself is not affected by this vulnerability. However,\nit is affected when it is used with Cisco Network Registrar software. \n\nNo other Cisco products are currently known to be affected by these\nvulnerabilities. \n\nDetails\n=======\n\nThe Domain Name System is an integral part of networks that are based\non TCP/IP such as the Internet. Simply stated, the Domain Name System\nis a hierarchical database that contains mappings of hostnames and IP\naddresses. When handling\na query from a DNS client, a DNS server can look into its portion of the\nglobal DNS database (if the query is for a portion of the DNS database\nfor which the DNS server is authoritative), or it can relay the query\nto other DNS servers (if it is configured to do so and if the query\nis for a portion of the DNS database for which the DNS server is not\nauthoritative.)\n\nBecause of the processing time and bandwidth that is associated with\nhandling a DNS query, most DNS servers locally store responses that\nare received from other DNS servers. If this happens, a user who\nis trying to visit www.example.com may end up contacting the wrong web\nserver. The fundamental implementation\nweakness is that the DNS transaction ID and source port number used to\nvalidate DNS responses are not sufficiently randomized and can easily\nbe predicted, which allows an attacker to create forged responses to\nDNS queries that will match the expected values. The DNS server will\nconsider such responses to be valid. \n\nThe following Cisco products that offer DNS server functionality have\nbeen found to be susceptible to DNS cache poisoning attacks:\n\n * Cisco IOS Software: The vulnerability documented in Cisco bug ID\n CSCso81854. \n\n * Cisco Network Registrar: The vulnerability documented in Cisco\n bug ID CSCsq01298. \n\n * Cisco Application and Content Networking System (ACNS): The\n vulnerability documented in Cisco bug ID CSCsq21930. \n\nThis vulnerability has been assigned Common Vulnerabilities and\nExposures (CVE) ID CVE-2008-1447. \n\nVulnerability Scoring Details\n+----------------------------\n\nCisco has provided scores for the vulnerabilities in this advisory based\non the Common Vulnerability Scoring System (CVSS). The CVSS scoring in\nthis Security Advisory is done in accordance with CVSS version 2.0. \n\nCVSS is a standards-based scoring method that conveys vulnerability\nseverity and helps determine urgency and priority of response. \n\nCisco has provided a base and temporal score. Customers can then\ncompute environmental scores to assist in determining the impact of the\nvulnerability in individual networks. \n\nCisco has provided an FAQ to answer additional questions regarding CVSS\nat\n\nhttp://www.cisco.com/web/about/security/intelligence/cvss-qandas.html\n\nCisco has also provided a CVSS calculator to help compute the\nenvironmental impact for individual networks at\n\nhttp://intellishield.cisco.com/security/alertmanager/cvss\n\nCisco Bugs:\n\n* DNS cache prone to poisoning/forged answers attacks (CSCsq21930)\n\n* DNS susceptible to forged query response attacks (CSCsq01298)\n\n* Need to make DNS implementation more resilient against forged answers\n(CSCso81854)\n\nCVSS Base Score - 6.4\n Access Vector - Network\n Access Complexity - Low\n Authentication - None\n Confidentiality Impact - None\n Integrity Impact - Partial\n Availability Impact - Partial\n\nCVSS Temporal Score - 5.3\n Exploitability - Functional\n Remediation Level - Official-Fix\n Report Confidence - Confirmed\n\n(same score for the three Cisco bugs listed above.)\n\nImpact\n======\n\nSuccessful exploitation of the vulnerability described in this document\nmay result in invalid hostname-to-IP address mappings in the cache of an\naffected DNS server. This may lead users of this DNS server to contact\nthe wrong provider of network services. The ultimate impact varies\ngreatly, ranging from a simple denial of service (for example, making\nwww.example.com resolve to 127.0.0.1) to phishing and financial fraud. \n\nSoftware Versions and Fixes\n===========================\n\nWhen considering software upgrades, also consult\nhttp://www.cisco.com/go/psirt and any subsequent advisories to determine\nexposure and a complete upgrade solution. \n\nIn all cases, customers should exercise caution to be certain the\ndevices to be upgraded contain sufficient memory and that current\nhardware and software configurations will continue to be supported\nproperly by the new release. If the information is not clear, contact\nthe Cisco Technical Assistance Center (TAC) or your contracted\nmaintenance provider for assistance. \n\nCisco IOS Software\n+-----------------\n\nEach row of the Cisco IOS Software table (below) names a Cisco IOS\nSoftware release train. If a given release train is vulnerable, then\nthe earliest possible releases that contain the fix (along with the\nanticipated date of availability for each, if applicable) are listed in\nthe \"First Fixed Release\" column of the table. The \"Recommended Release\"\ncolumn indicates the releases which have fixes for all the published\nvulnerabilities at the time of this Advisory. A device running a release\nin the given train that is earlier than the release in a specific column\n(less than the First Fixed Release) is known to be vulnerable. Cisco\nrecommends upgrading to a release equal to or later than the release in\nthe \"Recommended Releases\" column of the table. \n\n+----------------------------------------+\n| Major | Availability of |\n| Release | Repaired Releases |\n|------------+---------------------------|\n| Affected | First Fixed | Recommended |\n| 12.0-Based | Release | Release |\n| Releases | | |\n|------------+-------------+-------------|\n| 12.0 | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0DA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.0(7)DB | |\n| | are | |\n| | vulnerable, | 12.4(19a) |\n| 12.0DB | release | |\n| | 12.0(7)DB | 12.4(19b) |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n| | first fixed | |\n| | in 12.4 | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.0(7)DC | |\n| | are | |\n| | vulnerable, | 12.4(19a) |\n| 12.0DC | release | |\n| | 12.0(7)DC | 12.4(19b) |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n| | first fixed | |\n| | in 12.4 | |\n|------------+-------------+-------------|\n| 12.0S | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0SC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0SL | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0SP | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0ST | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0SX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0SY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0SZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.0T | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.0W | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0WC | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| 12.0WT | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Note: | |\n| | Releases | |\n| | prior to | |\n| | 12.0(7)XE1 | |\n| | are | |\n| 12.0XE | vulnerable, | |\n| | release | |\n| | 12.0(7)XE1 | |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n|------------+-------------+-------------|\n| 12.0XF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XG | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XH | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XI | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XJ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.0(7)XK2 | |\n| | are | |\n| | vulnerable, | 12.4(19a) |\n| 12.0XK | release | |\n| | 12.0(7)XK2 | 12.4(19b) |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n| | first fixed | |\n| | in 12.4 | |\n|------------+-------------+-------------|\n| 12.0XL | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XM | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XN | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XQ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.0(7)XR1 | |\n| | are | |\n| | vulnerable, | 12.4(19a) |\n| 12.0XR | release | |\n| | 12.0(7)XR1 | 12.4(19b) |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n| | first fixed | |\n| | in 12.4 | |\n|------------+-------------+-------------|\n| 12.0XS | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XV | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.0XW | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| Affected | First Fixed | Recommended |\n| 12.1-Based | Release | Release |\n| Releases | | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.1 | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.1AA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1AX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.1(22)AY1 | |\n| | are | |\n| 12.1AY | vulnerable, | 12.1(22) |\n| | release | EA11 |\n| | 12.1(22)AY1 | |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n|------------+-------------+-------------|\n| 12.1AZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1CX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1DA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.1(4)DB1 | |\n| | are | |\n| | vulnerable, | 12.4(19a) |\n| 12.1DB | release | |\n| | 12.1(4)DB1 | 12.4(19b) |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n| | first fixed | |\n| | in 12.4 | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.1(4)DC2 | |\n| | are | |\n| | vulnerable, | 12.4(19a) |\n| 12.1DC | release | |\n| | 12.1(4)DC2 | 12.4(19b) |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n| | first fixed | |\n| | in 12.4 | |\n|------------+-------------+-------------|\n| 12.1E | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.1(11)EA1 | |\n| | are | |\n| 12.1EA | vulnerable, | 12.1(22) |\n| | release | EA11 |\n| | 12.1(11)EA1 | |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n|------------+-------------+-------------|\n| 12.1EB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1EC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1EO | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1EU | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1EV | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1EW | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Note: | |\n| | Releases | |\n| | prior to | |\n| | 12.1(8a)EX | |\n| | are | |\n| 12.1EX | vulnerable, | |\n| | release | |\n| | 12.1(8a)EX | |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n|------------+-------------+-------------|\n| 12.1EY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1EZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1GA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1GB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.1T | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.1XA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.1(1)XC1 | |\n| | are | |\n| | vulnerable, | 12.4(19a) |\n| 12.1XC | release | |\n| | 12.1(1)XC1 | 12.4(19b) |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n| | first fixed | |\n| | in 12.4 | |\n|------------+-------------+-------------|\n| 12.1XD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XE | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XG | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XH | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XI | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XJ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XK | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XL | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XM | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XN | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XO | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XP | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XQ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XR | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XS | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XT | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XU | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XV | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XW | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1XZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1YA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1YB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1YC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1YD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Note: | |\n| | Releases | |\n| | prior to | |\n| | 12.1(5)YE1 | |\n| | are | 12.4(19a) |\n| 12.1YE | vulnerable, | |\n| | release | 12.4(19b) |\n| | 12.1(5)YE1 | |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n|------------+-------------+-------------|\n| 12.1YF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1YG | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1YH | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1YI | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.1YJ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| Affected | First Fixed | Recommended |\n| 12.2-Based | Release | Release |\n| Releases | | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2 | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2B | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.2BC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2BW | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.2(8)BY | |\n| | are | |\n| | vulnerable, | 12.4(19a) |\n| 12.2BY | release | |\n| | 12.2(8)BY | 12.4(19b) |\n| | and later | |\n| | are not | |\n| | vulnerable; | |\n| | first fixed | |\n| | in 12.4 | |\n|------------+-------------+-------------|\n| 12.2BZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2CX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2CY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2CZ | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| 12.2DA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2DD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2DX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2EU | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2EW | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2EWA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2EX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2EY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2EZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2FX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2FY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2FZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2IXA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2IXB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2IXC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2IXD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2IXE | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2IXF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2JA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2JK | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2MB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2MC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2S | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SBC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SCA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SE | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SEA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SEB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SEC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SED | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SEE | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SEF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SEG | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SG | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SGA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SL | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SM | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SO | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SRA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SRB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SRC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SU | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SV | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SVA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SVC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SVD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SW | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SXA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SXB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SXD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SXE | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SXF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SXH | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SXI | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2SZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2T | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.2(8) | |\n| | TPC10d are | |\n| | vulnerable, | |\n| 12.2TPC | release | |\n| | 12.2(8) | |\n| | TPC10d and | |\n| | later are | |\n| | not | |\n| | vulnerable; | |\n|------------+-------------+-------------|\n| 12.2UZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2XB | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2XC | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.2XD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XE | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2XG | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.2XH | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XI | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XJ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2XK | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2XL | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.2XM | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XN | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XNA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XO | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XQ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XR | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XS | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2XT | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2XU | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.2XV | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2XW | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YD | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YE | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YG | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YH | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2YJ | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.2YK | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2YL | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2YM | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2YN | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.2(18) |\n| | migrate to | SXF15; |\n| 12.2YO | any release | Available |\n| | in 12.2SY | on |\n| | | 08-AUG-08 |\n|------------+-------------+-------------|\n| 12.2YP | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YQ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YR | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YS | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2YT | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2YU | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2YV | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.2YW | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2YZ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2ZA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2ZB | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.2ZC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2ZD | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2ZE | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2ZF | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.2ZG | first fixed | |\n| | in 12.4T | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.2ZH | first fixed | |\n| | in 12.4 | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.2ZJ | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.2ZL | first fixed | |\n| | in 12.4 | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| 12.2ZP | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2ZU | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2ZY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.2ZYA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| Affected | First Fixed | Recommended |\n| 12.3-Based | Release | Release |\n| Releases | | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3 | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3B | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.3BC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3BW | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.3EU | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.3JA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.3JEA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.3JEB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.3JEC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.3JK | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.3JL | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.3JX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3T | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.3TPC | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| 12.3VA | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.3XA | first fixed | |\n| | in 12.4 | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3XB | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.3XC | first fixed | |\n| | in 12.4 | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3XD | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.3XE | first fixed | |\n| | in 12.4 | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3XF | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.3XG | first fixed | |\n| | in 12.4T | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3XH | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.3XI | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| | | 12.3(14) |\n| | | YX12 |\n| | Vulnerable; | |\n| 12.3XJ | first fixed | 12.4(20)T; |\n| | in 12.3YX | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3XK | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3XQ | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.3XR | first fixed | |\n| | in 12.4 | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(19a) |\n| 12.3XS | first fixed | |\n| | in 12.4 | 12.4(19b) |\n|------------+-------------+-------------|\n| 12.3XU | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | | 12.3(14) |\n| | | YX12 |\n| | Vulnerable; | |\n| 12.3XW | first fixed | 12.4(20)T; |\n| | in 12.3YX | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| 12.3XY | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | | 12.4(19a) |\n| | | |\n| | Vulnerable; | 12.4(19b) |\n| 12.3YA | first fixed | |\n| | in 12.4 | 12.4(20)T; |\n| | | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.3YD | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | | 12.3(14) |\n| | | YX12 |\n| | Vulnerable; | |\n| 12.3YF | first fixed | 12.4(20)T; |\n| | in 12.3YX | Available |\n| | | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.3YG | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.3YH | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.3YI | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| 12.3YJ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.3YK | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Releases | |\n| | prior to | |\n| | 12.3(14) | |\n| | YM12 are | |\n| | vulnerable, | 12.3(14) |\n| 12.3YM | release | YM12 |\n| | 12.3(14) | |\n| | YM12 and | |\n| | later are | |\n| | not | |\n| | vulnerable; | |\n|------------+-------------+-------------|\n| 12.3YQ | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.3YS | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.3YT | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| | Vulnerable; | |\n| 12.3YU | first fixed | |\n| | in 12.4XB | |\n|------------+-------------+-------------|\n| 12.3YX | 12.3(14) | 12.3(14) |\n| | YX12 | YX12 |\n|------------+-------------+-------------|\n| 12.3YZ | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| Affected | First Fixed | Recommended |\n| 12.4-Based | Release | Release |\n| Releases | | |\n|------------+-------------+-------------|\n| | 12.4(18b) | |\n| | | |\n| | 12.4(19a) | 12.4(19a) |\n| 12.4 | | |\n| | 12.4(19b) | 12.4(19b) |\n| | | |\n| | 12.4(21) | |\n|------------+-------------+-------------|\n| 12.4JA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.4JK | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.4JMA | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.4JMB | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.4JMC | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.4JX | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.4MD | 12.4(15)MD | 12.4(15)MD |\n|------------+-------------+-------------|\n| 12.4MR | 12.4(19)MR | 12.4(19)MR |\n|------------+-------------+-------------|\n| 12.4SW | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| | 12.4(15)T6 | |\n| | | 12.4(20)T; |\n| 12.4T | 12.4(20)T; | Available |\n| | Available | on |\n| | on | 11-JUL-08 |\n| | 11-JUL-08 | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.4XA | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| 12.4XB | 12.4(2)XB10 | |\n|------------+-------------+-------------|\n| 12.4XC | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| | 12.4(4) | 12.4(20)T; |\n| | XD11; | Available |\n| 12.4XD | Available | on |\n| | on | 11-JUL-08 |\n| | 31-JUL-08 | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.4XE | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| 12.4XF | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.4XG | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.4XJ | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n|------------+-------------+-------------|\n| 12.4XK | Not | |\n| | Vulnerable | |\n|------------+-------------+-------------|\n| 12.4XL | 12.4(15)XL2 | 12.4(15)XL2 |\n|------------+-------------+-------------|\n| 12.4XM | 12.4(15)XM1 | 12.4(15)XM1 |\n|------------+-------------+-------------|\n| 12.4XN | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| 12.4XQ | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| 12.4XT | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| 12.4XV | Vulnerable; | |\n| | contact TAC | |\n|------------+-------------+-------------|\n| 12.4XW | 12.4(11)XW8 | 12.4(11)XW6 |\n|------------+-------------+-------------|\n| 12.4XY | 12.4(15)XY3 | |\n|------------+-------------+-------------|\n| | Vulnerable; | 12.4(20)T; |\n| 12.4XZ | first fixed | Available |\n| | in 12.4T | on |\n| | | 11-JUL-08 |\n+----------------------------------------+\n\nCisco Network Registrar\n+----------------------\n\n+---------------------------------------+\n| Affected | |\n| Release | First Fixed Release |\n| Train | |\n|--------------+------------------------|\n| 6.1.x | Contact TAC |\n|--------------+------------------------|\n| | 6.3.1.1 patch; |\n| 6.3.x | available mid-July |\n| | 2008 |\n|--------------+------------------------|\n| 7.0.x | 7.0.1; available in |\n| | mid-July 2008 |\n+---------------------------------------+\n\nCisco Network Registrar software is available for download at:\n\nhttp://www.cisco.com/pcgi-bin/Software/Tablebuild/tablebuild.pl/nr-eval\n\nCisco Application and Content Networking System\n+----------------------------------------------\n\nThis issue is fixed in version 5.5.11 of Cisco ACNS software. This\nrelease will be available for download from www.cisco.com in late July\n2008. \n\nCisco ACNS 5.5 software is available for download at:\n\nhttp://www.cisco.com/pcgi-bin/tablebuild.pl/acns55\n\nWorkarounds\n===========\n\nThere are no workarounds. \n\nAdditional information about identification and mitigation of attacks\nagainst DNS is in the Cisco Applied Intelligence white paper \"DNS Best\nPractices, Network Protections, and Attack Identification,\" available at\nhttp://www.cisco.com/web/about/security/intelligence/dns-bcp.html. \n\nObtaining Fixed Software\n========================\n\nCisco has released free software updates that address these\nvulnerabilities. Prior to deploying software, customers should consult\ntheir maintenance provider or check the software for feature set\ncompatibility and known issues specific to their environment. \n\nCustomers may only install and expect support for the feature sets\nthey have purchased. By installing, downloading, accessing or\notherwise using such software upgrades, customers agree to be bound\nby the terms of Cisco\u0027s software license terms found at\nhttp://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html,\nor as otherwise set forth at Cisco.com Downloads at\nhttp://www.cisco.com/public/sw-center/sw-usingswc.shtml. \n\nDo not contact psirt@cisco.com or security-alert@cisco.com for software\nupgrades. \n\nCustomers with Service Contracts\n+-------------------------------\n\nCustomers with contracts should obtain upgraded software through their\nregular update channels. For most customers, this means that upgrades\nshould be obtained through the Software Center on Cisco\u0027s worldwide\nwebsite at http://www.cisco.com. \n\nCustomers using Third Party Support Organizations\n+------------------------------------------------\n\nCustomers whose Cisco products are provided or maintained through prior\nor existing agreements with third-party support organizations, such\nas Cisco Partners, authorized resellers, or service providers should\ncontact that support organization for guidance and assistance with the\nappropriate course of action in regards to this advisory. \n\nThe effectiveness of any workaround or fix is dependent on specific\ncustomer situations, such as product mix, network topology, traffic\nbehavior, and organizational mission. Due to the variety of affected\nproducts and releases, customers should consult with their service\nprovider or support organization to ensure any applied workaround or fix\nis the most appropriate for use in the intended network before it is\ndeployed. \n\nCustomers without Service Contracts\n+----------------------------------\n\nCustomers who purchase direct from Cisco but do not hold a Cisco service\ncontract, and customers who purchase through third-party vendors but are\nunsuccessful in obtaining fixed software through their point of sale\nshould acquire upgrades by contacting the Cisco Technical Assistance\nCenter (TAC). TAC contacts are as follows. \n\n * +1 800 553 2447 (toll free from within North America)\n * +1 408 526 7209 (toll call from anywhere in the world)\n * e-mail: tac@cisco.com\n\nCustomers should have their product serial number available and be\nprepared to give the URL of this notice as evidence of entitlement to a\nfree upgrade. Free upgrades for non-contract customers must be requested\nthrough the TAC. \n\nRefer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml\nfor additional TAC contact information, including localized telephone\nnumbers, and instructions and e-mail addresses for use in various\nlanguages. \n\nExploitation and Public Announcements\n=====================================\n\nThe Cisco PSIRT is not aware of any public announcements or malicious\nuse of the vulnerability described in this advisory. Cisco would like to\nthank Dan Kaminsky for notifying vendors about his findings. \n\nNote that vulnerability information for Cisco IOS Software is being\nprovided in this advisory outside of the announced publication schedule\nfor Cisco IOS Software described at http://www.cisco.com/go/psirt due to\nindustry-wide disclosure of the vulnerability. \n\nStatus of this Notice: FINAL\n============================\n\nTHIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY\nANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF\nMERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE\nINFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS\nAT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS\nDOCUMENT AT ANY TIME. \n\nA stand-alone copy or Paraphrase of the text of this document that omits\nthe distribution URL in the following section is an uncontrolled copy,\nand may lack important information or contain factual errors. \n\nDistribution\n============\n\nThis advisory is posted on Cisco\u0027s worldwide website at\n\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml\n\nIn addition to worldwide web posting, a text version of this notice is\nclear-signed with the Cisco PSIRT PGP key and is posted to the following\ne-mail and Usenet news recipients. \n\n * cust-security-announce@cisco.com\n * first-teams@first.org\n * bugtraq@securityfocus.com\n * vulnwatch@vulnwatch.org\n * cisco@spot.colorado.edu\n * cisco-nsp@puck.nether.net\n * full-disclosure@lists.grok.org.uk\n * comp.dcom.sys.cisco@newsgate.cisco.com\n\nFuture updates of this advisory, if any, will be placed on Cisco\u0027s\nworldwide website, but may or may not be actively announced on mailing\nlists or newsgroups. Users concerned about this problem are encouraged\nto check the above URL for any updates. \n\nRevision History\n================\n\n+-----------------------------------------------------------+\n| Revision 1.0 | 2008-July-08 | Initial public release |\n+-----------------------------------------------------------+\n\nCisco Security Procedures\n=========================\n\nComplete information on reporting security vulnerabilities in\nCisco products, obtaining assistance with security incidents, and\nregistering to receive security information from Cisco, is available\non Cisco\u0027s worldwide website at\nhttp://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. \nThis includes instructions for press inquiries regarding Cisco security\nnotices. All Cisco security advisories are available at\nhttp://www.cisco.com/go/psirt. \n\n+--------------------------------------------------------------------\nCopyright 2007-2008 Cisco Systems, Inc. All rights reserved. \n+--------------------------------------------------------------------\n\nUpdated: Jul 08, 2008 Document ID: 107064\n\n+--------------------------------------------------------------------\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niEYEARECAAYFAkhztUIACgkQ86n/Gc8U/uCAgACfVRRoJO4w4defnpwbNlfgBm4t\n2SMAnjKCKECHtsjN9umqqPrPd2DW4IcC\n=XGZw\n-----END PGP SIGNATURE-----\n. This could be used to misdirect users and services;\n i.e. for web and email traffic (CVE-2008-1447). \n \n This update provides the latest stable BIND releases for all platforms\n except Corporate Server/Desktop 3.0 and MNF2, which have been patched\n to correct the issue. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 73cc24fc9586b7ab290d755012c16a79 2007.1/i586/bind-9.4.2-0.1mdv2007.1.i586.rpm\n 70867c50cfd64b4406aa002d627d740b 2007.1/i586/bind-devel-9.4.2-0.1mdv2007.1.i586.rpm\n 3603e9d9115466753397a1f472011703 2007.1/i586/bind-utils-9.4.2-0.1mdv2007.1.i586.rpm \n cf5e4100ecb21a4eb603831e5a6ec23d 2007.1/SRPMS/bind-9.4.2-0.1mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n 4eb7ce0984d3ce3befff667392e3bf3e 2007.1/x86_64/bind-9.4.2-0.1mdv2007.1.x86_64.rpm\n d7b9a9e7d4c52a5b0c54f59ca20bf2d5 2007.1/x86_64/bind-devel-9.4.2-0.1mdv2007.1.x86_64.rpm\n c5c66c9609615029d2f07f7b09a63118 2007.1/x86_64/bind-utils-9.4.2-0.1mdv2007.1.x86_64.rpm \n cf5e4100ecb21a4eb603831e5a6ec23d 2007.1/SRPMS/bind-9.4.2-0.1mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 52dfe3970fcd9495b2bb9379a9312b25 2008.0/i586/bind-9.4.2-1mdv2008.0.i586.rpm\n 97d20d35b6814aa2f9fab549ca6237c0 2008.0/i586/bind-devel-9.4.2-1mdv2008.0.i586.rpm\n 87a7bb3dd25abd8cd882a8f2fdc2398e 2008.0/i586/bind-utils-9.4.2-1mdv2008.0.i586.rpm \n da4444a8074e6ede39dfa557fb258db7 2008.0/SRPMS/bind-9.4.2-1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n b9d0337363bc1e2b14505f25d4ee5f99 2008.0/x86_64/bind-9.4.2-1mdv2008.0.x86_64.rpm\n 9b75e2a96784c00c2912bc3bf333d089 2008.0/x86_64/bind-devel-9.4.2-1mdv2008.0.x86_64.rpm\n 0a593b090d9e6bda3666e234056e19ba 2008.0/x86_64/bind-utils-9.4.2-1mdv2008.0.x86_64.rpm \n da4444a8074e6ede39dfa557fb258db7 2008.0/SRPMS/bind-9.4.2-1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.1:\n 2534ef007262d4ea2d219bab0190466c 2008.1/i586/bind-9.5.0-3mdv2008.1.i586.rpm\n c3feee5d05aa3aee14cd70a2d295d0b1 2008.1/i586/bind-devel-9.5.0-3mdv2008.1.i586.rpm\n f306c06665b723a2530258e6d1dbdae2 2008.1/i586/bind-doc-9.5.0-3mdv2008.1.i586.rpm\n 967ef80628f92160930bc3a3827a216e 2008.1/i586/bind-utils-9.5.0-3mdv2008.1.i586.rpm \n 70fc7a7964944a2926979710c5148ed1 2008.1/SRPMS/bind-9.5.0-3mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n 3f4d96d7a7f913c141e1f63cdc7e7336 2008.1/x86_64/bind-9.5.0-3mdv2008.1.x86_64.rpm\n 420db658366763686198f41394aa72b3 2008.1/x86_64/bind-devel-9.5.0-3mdv2008.1.x86_64.rpm\n 6f3674f68311494c5a9ff0dbce831e82 2008.1/x86_64/bind-doc-9.5.0-3mdv2008.1.x86_64.rpm\n 4294b3a086b89bf53c5c967c17962447 2008.1/x86_64/bind-utils-9.5.0-3mdv2008.1.x86_64.rpm \n 70fc7a7964944a2926979710c5148ed1 2008.1/SRPMS/bind-9.5.0-3mdv2008.1.src.rpm\n\n Corporate 3.0:\n de2a4372d1c25d73f343c9fcb044c9dd corporate/3.0/i586/bind-9.2.3-6.5.C30mdk.i586.rpm\n 1f24f6dbdb6c02e21cbbef99555049cb corporate/3.0/i586/bind-devel-9.2.3-6.5.C30mdk.i586.rpm\n 00405b98290d5a41f226081baa57e18d corporate/3.0/i586/bind-utils-9.2.3-6.5.C30mdk.i586.rpm \n 6a237dc290f4f7c463b1996e6a4a4515 corporate/3.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n 628162f3d6a414828d2231fefc46842b corporate/3.0/x86_64/bind-9.2.3-6.5.C30mdk.x86_64.rpm\n dd29ff31a9cffcc1b20fd045869d7013 corporate/3.0/x86_64/bind-devel-9.2.3-6.5.C30mdk.x86_64.rpm\n c475c1a4d048e04da1fc27dcbb17c3f3 corporate/3.0/x86_64/bind-utils-9.2.3-6.5.C30mdk.x86_64.rpm \n 6a237dc290f4f7c463b1996e6a4a4515 corporate/3.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm\n\n Corporate 4.0:\n 271ead204904be302d197cd542f5ae23 corporate/4.0/i586/bind-9.3.5-0.4.20060mlcs4.i586.rpm\n 42413dcc1cf053e735216f767eff4e5d corporate/4.0/i586/bind-devel-9.3.5-0.4.20060mlcs4.i586.rpm\n 0201afe493a41e1deedc9bf7e9725f4a corporate/4.0/i586/bind-utils-9.3.5-0.4.20060mlcs4.i586.rpm \n 86bc0cdc9ed1b959b6f56e0660268f2e corporate/4.0/SRPMS/bind-9.3.5-0.4.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n b1a18a7d0578dab7bd825eda6c682b3d corporate/4.0/x86_64/bind-9.3.5-0.4.20060mlcs4.x86_64.rpm\n 6a2ebd550feb9147058de05b1a1ef04d corporate/4.0/x86_64/bind-devel-9.3.5-0.4.20060mlcs4.x86_64.rpm\n 670a1b934ce4974b8505018ab69ade0b corporate/4.0/x86_64/bind-utils-9.3.5-0.4.20060mlcs4.x86_64.rpm \n 86bc0cdc9ed1b959b6f56e0660268f2e corporate/4.0/SRPMS/bind-9.3.5-0.4.20060mlcs4.src.rpm\n\n Multi Network Firewall 2.0:\n 5b694c24cc2092e38f531dbfdd5c9d41 mnf/2.0/i586/bind-9.2.3-6.5.C30mdk.i586.rpm\n c08bc805027059c47bed32215f17eacb mnf/2.0/i586/bind-utils-9.2.3-6.5.C30mdk.i586.rpm \n 39225289516498e1b071c5059306f2b9 mnf/2.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFIdPwTmqjQ0CJFipgRAm9AAJ9/UOAuOWDL1KgnMNGM/224QGUNQgCfW+G9\nJ7qxrU208lhOcIjhtq8FWX8=\n=91dV\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. When the destination address is a DNS port, it will allow remote attackers to bypass CVE-2008 -1447 security protection. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n- ------------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2008-0014\nSynopsis: Updates to VMware Workstation, VMware Player,\n VMware ACE, VMware Server, VMware ESX address\n information disclosure, privilege escalation and\n other security issues. \nIssue date: 2008-08-29\nUpdated on: 2008-08-29 (initial release of advisory)\nCVE numbers: CVE-2008-2101 CVE-2007-5269 CVE-2008-1447\n CVE-2008-3691 CVE-2008-3692 CVE-2008-3693\n CVE-2008-3694 CVE-2008-3695 CVE-2007-5438\n CVE-2008-3696 CVE-2008-3697 CVE-2008-3698\n CVE-2008-1806 CVE-2008-1807 CVE-2008-1808\n CVE-2007-5503\n- --------------------------------------------------------------------------\n\n1. Summary\n\n Updates to VMware Workstation, VMware Player, VMware ACE, VMware\n Server, VMware ESX address information disclosure, privilege\n escalation and other security issues. \n\n2. Relevant releases\n\n VMware Workstation 6.0.4 and earlier,\n VMware Workstation 5.5.7 and earlier,\n VMware Player 2.0.4 and earlier,\n VMware Player 1.0.7 and earlier,\n VMware ACE 2.0.4 and earlier,\n VMware ACE 1.0.6 and earlier,\n VMware Server 1.0.6 and earlier,\n\n VMware ESX 3.0.3 without patches ESX303-200808404-SG, ESX303-200808403-SG\n ESX303-200808406-SG. \n\n\n VMware ESX 3.0.2 without patches ESX-1005109, ESX-1005113,\n ESX-1005114. \n\n VMware ESX 3.0.1 without patches ESX-1005108, ESX-1005112,\n ESX-1005111, ESX-1004823,\n ESX-1005117. \n\n NOTE: Hosted products VMware Workstation 5.x, VMware Player 1.x,\n and VMware ACE 1.x will reach end of general support\n 2008-11-09. Customers should plan to upgrade to the latest\n version of their respective products. \n\n Extended support (Security and Bug fixes) for ESX 3.0.2 ends\n on 10/29/2008 and Extended support for ESX 3.0.2 Update 1\n ends on 8/8/2009. Users should plan to upgrade to ESX 3.0.3\n and preferably to the newest release available. \n\n Extended Support (Security and Bug fixes) for ESX 3.0.1 has\n ended on 2008-07-31. \n\n3. Problem Description\n\n I Security Issues\n\n a. Setting ActiveX killbit\n\n Starting from this release, VMware has set the killbit on its\n ActiveX controls. Setting the killbit ensures that ActiveX\n controls cannot run in Internet Explorer (IE), and avoids\n security issues involving ActiveX controls in IE. See the\n Microsoft KB article 240797 and the related references on this\n topic. \n\n Security vulnerabilities have been reported for ActiveX controls\n provided by VMware when run in IE. Under specific circumstances,\n exploitation of these ActiveX controls might result in denial-of-\n service or can allow running of arbitrary code when the user\n browses a malicious Web site or opens a malicious file in IE\n browser. An attempt to run unsafe ActiveX controls in IE might\n result in pop-up windows warning the user. \n\n Note: IE can be configured to run unsafe ActiveX controls without\n prompting. VMware recommends that you retain the default\n settings in IE, which prompts when unsafe actions are\n requested. \n\n Earlier, VMware had issued knowledge base articles, KB 5965318 and\n KB 9078920 on security issues with ActiveX controls. To avoid\n malicious scripts that exploit ActiveX controls, do not enable\n unsafe ActiveX objects in your browser settings. As a best\n practice, do not browse untrusted Web sites as an administrator\n and do not click OK or Yes if prompted by IE to allow certain\n actions. \n\n VMware would like to thank Julien Bachmann, Shennan Wang, Shinnai,\n and Michal Bucko for reporting these issues to us. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n Workstation 6.x Windows 6.0.5 build 109488 or later\n Workstation 6.x Linux not affected\n Workstation 5.x Windows 5.5.8 build 108000 or later\n Workstation 5.x Linux not affected\n\n Player 2.x Windows 2.0.5 build 109488 or later\n Player 2.x Linux not affected\n Player 1.x Windows 1.0.8 build or later\n Player 1.x Linux not affected\n\n ACE 2.x Windows 2.0.5 build 109488 or later\n ACE 1.x Windows 1.0.7 build 108880 or later\n\n Server 1.x Windows 1.0.7 build 108231 or later\n Server 1.x Linux not affected\n\n Fusion 1.x Mac OS/X not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX any ESX not affected\n\n\n b. VMware ISAPI Extension Denial of Service\n\n The Internet Server Application Programming Interface (ISAPI) is\n an API that extends the functionality of Internet Information\n Server (IIS). VMware uses ISAPI extensions in its Server product. \n\n One of the ISAPI extensions provided by VMware is vulnerable to a\n remote denial of service. By sending a malformed request, IIS\n might shut down. IIS 6.0 restarts automatically. However, IIS 5.0\n does not restart automatically when its Startup Type is set to\n Manual. \n\n VMware would like to thank the Juniper Networks J-Security\n Security Research Team for reporting this issue to us. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n Workstation 6.x Windows not affected\n Workstation 6.x Linux not affected\n Workstation 5.x Windows not affected\n Workstation 5.x Linux not affected\n\n Player 2.x Windows not affected\n Player 2.x Linux not affected\n Player 1.x Windows not affected\n Player 1.x Linux not affected\n\n ACE 2.x Windows not affected\n ACE 1.x Windows not affected\n\n Server 1.x Windows 1.0.7 build 108231 or later\n Server 1.x Linux not affected\n\n Fusion 1.x Mac OS/X not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX any ESX not affected\n\n c. OpenProcess Local Privilege Escalation on Host System\n\n This release fixes a privilege escalation vulnerability in host\n systems. Exploitation of this vulnerability allows users to run\n arbitrary code on the host system with elevated privileges. \n\n VMware would like to thank Sun Bing from McAfee, Inc. for\n reporting this issue to us. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n Workstation 6.x Windows not affected\n Workstation 6.x Linux not affected\n Workstation 5.x Windows 5.5.8 build 108000 or later\n Workstation 5.x Linux not affected\n\n Player 2.x Windows not affected\n Player 2.x Linux not affected\n Player 1.x Windows 1.0.8 build 109488 or later\n Player 1.x Linux not affected\n\n ACE 2.x Windows not affected\n ACE 1.x Windows 1.0.7 build 108880 or later\n\n Server 1.x Windows 1.0.7 build 108231 or later\n Server 1.x Linux not affected\n\n Fusion 1.x Mac OS/X not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX any ESX not affected\n\n d. Update to Freetype\n\n FreeType 2.3.6 resolves an integer overflow vulnerability and other\n vulnerabilities that can allow malicious users to run arbitrary code\n or might cause a denial-of-service after reading a maliciously\n crafted file. This release updates FreeType to 2.3.7. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n Workstation 6.x Windows not affected\n Workstation 6.x Linux 6.0.5 build 109488 or later\n Workstation 5.x Windows not affected\n Workstation 5.x Linux 5.5.8 build 108000 or later\n\n Player 2.x Windows not affected\n Player 2.x Linux 2.0.5 build 109488 or later\n Player 1.x Windows not affected\n Player 1.x Linux 1.0.8 build 108000 or later\n\n ACE 2.x Windows not affected\n ACE 1.x Windows not affected\n\n Server 1.x Windows not affected\n Server 1.x Linux 1.0.7 build 108231 or later\n\n Fusion 1.x Mac OS/X affected, patch pending\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX not affected\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX not affected\n ESX 3.0.1 ESX not affected\n ESX 2.5.5 ESX affected, patch pending\n ESX 2.5.4 ESX affected, patch pending\n\n e. Update to Cairo\n\n Cairo 1.4.12 resolves an integer overflow vulnerability that can\n allow malicious users to run arbitrary code or might cause a\n denial-of-service after reading a maliciously crafted PNG file. \n This release updates Cairo to 1.4.14. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n Workstation 6.x Windows not affected\n Workstation 6.x Linux 6.0.5 build 109488 or later\n Workstation 5.x Windows not affected\n Workstation 5.x Linux not affected\n\n Player 2.x Windows not affected\n Player 2.x Linux 2.0.5 build 109488 or later\n Player 1.x Windows not affected\n Player 1.x Linux not affected\n\n ACE 2.x Windows not affected\n ACE 1.x Windows not affected\n\n Server 1.x Windows not affected\n Server 1.x Linux not affected\n\n Fusion 1.x Mac OS/X affected, patch pending\n\n ESXi 3.5 ESXi not affected\n\n ESX any ESX not affected\n\n f. VMware Consolidated Backup(VCB) command-line utilities may expose\n sensitive information\n\n VMware Consolidated Backup command-line utilities accept the user\n password through the -p command-line option. Users logged into the\n service console could gain access to the username and password used\n by VCB command-line utilities when such commands are running. \n\n This patch resolves this issue by providing an alternative way of\n passing the password used by VCB command-line utilities. \n\n The following options are recommended for passing the password:\n\n 1. The password is specified in /etc/backuptools.conf\n (PASSWORD=xxxxx), and -p is not used in the command line. \n /etc/backuptools.conf file permissions are read/write only\n for root. \n\n 2. No password is specified in /etc/backuptools.conf and the\n -p option is not used in the command line. The user will be\n prompted to enter a password. \n\n ESX is not affected unless you use VCB. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= ===================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200806203-UG\n ESX 3.0.3 ESX ESX303-200808403-SG\n ESX 3.0.2 ESX ESX-1004824\n ESX 3.0.1 ESX ESX-1004823\n ESX 2.5.5 ESX not affected\n ESX 2.5.4 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n\n g. Third Party Library libpng Updated to 1.2.29\n\n Several flaws were discovered in the way third party library\n libpng handled various PNG image chunks. An attacker could\n create a carefully crafted PNG image file in such a way that\n it causes an application linked with libpng to crash when the\n file is manipulated. \n\n NOTE: There are multiple patches required to remediate the issue. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= ===================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi affected, patch pending\n\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX ESX303-200808404-SG\n ESX303-200808403-SG\n ESX 3.0.2 ESX ESX-1005109 ESX-1005114 ESX-1005113\n ESX 3.0.1 ESX ESX-1005112 ESX-1005108 ESX-1005111\n ESX 2.5.5 ESX affected, patch pending\n ESX 2.5.4 ESX affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n\n\n II ESX Service Console rpm updates\n\n a. update to bind\n\n This update upgrades the service console rpms for bind-utils and\n bind-lib to version 9.2.4-22.el3. \n\n Version 9.2.4.-22.el3 addresses the recently discovered\n vulnerability in the BIND software used for Domain Name\n resolution (DNS). Of the BIND packages, VMware only ships bind-util\n and bind-lib in the service console and these components by\n themselves cannot be used to setup a DNS server. \n\n VMware explicitly discourages installing applications like BIND\n on the service console. In case the customer has installed BIND,\n and the DNS server is configured to support recursive queries,\n their ESX Server system is affected and they should replace BIND\n with a patched version. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= ===================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX patch pending\n ESX 3.0.3 ESX ESX303-200808406-SG\n ESX 3.0.2 ESX ESX-1006356\n ESX 3.0.1 ESX ESX-1005117\n ESX 2.5.5 ESX patch pending\n ESX 2.5.4 ESX patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n VMware Workstation 6.0.5\n ------------------------\n http://www.vmware.com/download/ws/\n Release notes:\n http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html\n\n Windows binary\n md5sum: 46b4c54f0493f59f52ac6c2965296859\n\n RPM Installation file for 32-bit Linux\n md5sum: 49ebfbd05d146ecc43262622ab746f03\n\n tar Installation file for 32-bit Linux\n md5sum: 14ac93bffeee72528629d4caecc5ef37\n\n RPM Installation file for 64-bit Linux\n md5sum: 0a856f1a1a31ba3c4b08bcf85d97ccf6\n\n tar Installation file for 64-bit Linux\n md5sum: 3b459254069d663e9873a661bc97cf6c\n\n VMware Workstation 5.5.8\n ------------------------\n http://www.vmware.com/download/ws/ws5.html\n Release notes:\n http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html\n\n Windows binary:\n md5sum: 745c3250e5254eaf6e65fcfc4172070f\n\n Compressed Tar archive for 32-bit Linux\n md5sum: 65a454749d15d4863401619d7ff5566e\n\n Linux RPM version for 32-bit Linux\n md5sum: d80adc73b1500bdb0cb24d1b0733bcff\n\n\n VMware Player 2.0.5 and 1.0.8\n -----------------------------\n http://www.vmware.com/download/player/\n Release notes Player 1.x:\n http://www.vmware.com/support/player/doc/releasenotes_player.html\n Release notes Player 2.0\n http://www.vmware.com/support/player2/doc/releasenotes_player2.html\n\n 2.0.5 Windows binary\n md5sum: 60265438047259b23ff82fdfe737f969\n\n VMware Player 2.0.5 for Linux (.rpm)\n md5sum: 3bc81e203e947e6ca5b55b3f33443d34\n\n VMware Player 2.0.5 for Linux (.tar)\n md5sum: f499603d790edc5aa355e45b9c5eae01\n\n VMware Player 2.0.5 - 64-bit (.rpm)\n md5sum: 85bc2f11d06c362feeff1a64ee5a6834\n\n VMware Player 2.0.5 - 64-bit (.tar)\n md5sum: b74460bb961e88817884c7e2c0f30215\n\n 1.0.8 Windows binary\n md5sum: e5f927304925297a7d869f74b7b9b053\n\n Player 1.0.8 for Linux (.rpm)\n md5sum: a13fdb8d72b661cefd24e7dcf6e2a990\n\n Player 1.0.8 for Linux (.tar)\n md5sum: 99fbe861253eec5308d8c47938e8ad1e\n\n\n VMware ACE 2.0.5\n ----------------\n http://www.vmware.com/download/ace/\n Release notes 2.0:\n http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html\n\n ACE Manager Server Virtual Appliance\n Virtual Appliance for the ACE Management Server\n md5sum: 41e7349f3b6568dffa23055bb629208d\n\n ACE for Window 32-bit and 64-bit\n Main installation file for Windows 32-bit and 64-bit host (ACE Option\n Page key required for enabling ACE authoring)\n md5sum:46b4c54f0493f59f52ac6c2965296859\n\n ACE Management Server for Windows\n ACE Management Server installation file for Windows\n md5sum:33a015c4b236329bcb7e12c82271c417\n\n ACE Management Server for Red Hat Enterprise Linux 4\n ACE Management Server installation file for Red Hat Enterprise Linux 4\n md5sum:dc3bd89fd2285f41ed42f8b28cd5535f\n\n ACE Management Server for SUSE Enterprise Linux 9\n ACE Management Server installation file for SUSE Enterprise Linux 9\n md5sum:2add6a4fc97e1400fb2f94274ce0dce0\n\n VMware ACE 1.0.7\n ----------------\n http://www.vmware.com/download/ace/\n Release notes:\n http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html\n md5sum: 42d806cddb8e9f905722aeac19740f33\n\n VMware Server 1.0.7\n -------------------\n http://www.vmware.com/download/server/\n Release notes:\n http://www.vmware.com/support/server/doc/releasenotes_server.html\n\n VMware Server for Windows 32-bit and 64-bit\n md5sum: 2e2ee5ebe08ae48eac5e661cad01acf6\n\n VMware Server Windows client package\n md5sum: ce7d906a5a8de37cbc20db4332de1adb\n\n VMware Server for Linux\n md5sum: 04f201122b16222cd58fc81ca814ff8c\n\n VMware Server for Linux rpm\n md5sum: 6bae706df040c35851823bc087597d8d\n\n Management Interface\n md5sum: e67489bd2f23bcd4a323d19df4e903e8\n\n VMware Server Linux client package\n md5sum: 99f1107302111ffd3f766194a33d492b\n\n ESX\n ---\n ESX 3.5.0 patch ESX350-200806203-UG (VCB)\n http://download3.vmware.com/software/esx/ESX350-200806203-UG.zip\n md5sum: 3bd512dc8aa2b276f7cfd19080d193c9\n http://kb.vmware.com/kb/1005896\n\n ESX 3.0.3 patch ESX303-200808403-SG (libpng)\n http://download3.vmware.com/software/vi/ESX303-200808403-SG.zip\n md5sum: 5f1e75631e53c0e9e013acdbe657cfc7\n http://kb.vmware.com/kb/1006034\n\n ESX 3.0.3 patch ESX303-200808404-SG (libpng)\n http://download3.vmware.com/software/vi/ESX303-200808404-SG.zip\n md5sum: 65468a5b6ba105cfde1dd444d77b2df4\n http://kb.vmware.com/kb/1006035\n\n ESX 3.0.3 patch ESX303-200808406-SG (bind)\n http://download3.vmware.com/software/vi/ESX303-200808406-SG.zip\n md5sum: a11273e8d430e5784071caff673995f4\n http://kb.vmware.com/kb/1006357\n\n ESX 3.0.3 patch (VCB)\n\n ESX 3.0.2 patch ESX-1005109 (libpng)\n http://download3.vmware.com/software/vi/ESX-1005109.tgz\n md5sum: 456d74d94317f852024aed5d3852be09\n http://kb.vmware.com/kb/1005109\n\n ESX 3.0.2 patch ESX-1005113 (libpng)\n http://download3.vmware.com/software/vi/ESX-1005113.tgz\n md5sum: 5d604f2bfd90585b9c8679f5fc8c31b7\n http://kb.vmware.com/kb/1005113\n\n ESX 3.0.2 patch ESX-1005114 (libpng)\n http://download3.vmware.com/software/vi/ESX-1005114.tgz\n md5sum: 3b6d33b334f0020131580fdd8f9b5365\n http://kb.vmware.com/kb/1005114\n\n ESX 3.0.2 patch ESX-1004824 (VCB)\n http://download3.vmware.com/software/vi/ESX-1004824.tgz\n md5sum: c72b0132c9f5d7b4cb1b9e47748a9c5b\n http://kb.vmware.com/kb/1004824\n\n ESX 3.0.2 patch ESX-1006356 (bind)\n http://download3.vmware.com/software/vi/ESX-1006356.tgz\n md5sum: f0bc9d0b641954145df3986cdb1c2bab\n http://kb.vmware.com/kb/1006356\n\n ESX 3.0.1 patch ESX-1005111 (libpng)\n http://download3.vmware.com/software/vi/ESX-1005111.tgz\n md5sum: 60e1be9b41070b3531c06f9a0595e24c\n http://kb.vmware.com/kb/1005111\n\n ESX 3.0.1 patch ESX-1005112 (libpng)\n http://download3.vmware.com/software/vi/ESX-1005112.tgz\n md5sum: ad645cef0f9fa18bb648ba5a37074732\n http://kb.vmware.com/kb/1005112\n\n ESX 3.0.1 patch ESX-1005108 (libpng)\n http://download3.vmware.com/software/vi/ESX-1005108.tgz\n md5sum: aabc873d978f023c929ccd9a54588ea5\n http://kb.vmware.com/kb/1005108\n\n ESX 3.0.1 patch ESX-1004823 (VCB)\n http://download3.vmware.com/software/vi/ESX-1004823.tgz\n md5sum: 5ff2e8ce50c18afca76fb16c28415a59\n http://kb.vmware.com/kb/1004823\n\n ESX 3.0.1 patch ESX-1005117 (bind)\n http://download3.vmware.com/software/vi/ESX-1005117.tgz\n md5sum: 5271ecc6e36fb6f1fdf372e57891aa33\n http://kb.vmware.com/kb/1005117\n\n\n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2101\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3691\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3692\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3693\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3694\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3695\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5438\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3696\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3697\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3698\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2008-08-29 VMSA-2008-0014\ninitial release\n\n- ------------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2008 VMware Inc. All customers should test the updates / patch in their environment. HP is investigating changes to reduce the performance issues. This bulletin will be revised when new updates / patch become available. Effective attack techniques against these\n vulnerabilities have been demonstrated. Tools\n and techniques have been developed that can reliably poison a domain of the\n attacker\u0027s choosing on most current implementations. As a result, the\n consensus of DNS software implementers is to implement source port\n randomization in their resolvers as a mitigation. \n\n\nII. Impact\n\n An attacker with the ability to conduct a successful cache poisoning attack\n can cause a nameserver\u0027s clients to contact the incorrect, and possibly\n malicious, hosts for particular services. Consequently, web traffic, email,\n and other important network data can be redirected to systems under the\n attacker\u0027s control. \n\n\nIII. Solution\n\nApply a patch from your vendor\n\n Patches have been released by a number of vendors to implement source port\n randomization in the nameserver. Please see the Systems Affected\n section of Vulnerability Note VU#800113 for additional details for specific\n vendors. \n\n As mentioned above, stub resolvers are also vulnerable to these attacks. \n Stub resolvers that will issue queries in response to attacker behavior, and\n may receive packets from an attacker, should be patched. System\n administrators should be alert for patches to client operating systems that\n implement port randomization in the stub resolver. \n\nWorkarounds\n\n Restrict access\n Administrators, particularly those who are unable to apply a patch, can\n limit exposure to this vulnerability by restricting sources that can ask for\n recursion. Note that restricting access will still allow attackers with\n access to authorized hosts to exploit this vulnerability. \n\n Filter traffic at network perimeters\n Because the ability to spoof IP addresses is necessary to conduct these\n attacks, administrators should take care to filter spoofed addresses at the\n network perimeter. IETF Request for Comments (RFC) documents RFC 2827, RFC\n 3704, and RFC 3013 describe best current practices (BCPs) for implementing\n this defense. It is important to understand your network\u0027s configuration and\n service requirements before deciding what changes are appropriate. \n\n Run a local DNS cache\n In lieu of strong port randomization characteristics in a stub resolver,\n administrators can protect their systems by using local caching full-service\n resolvers, both on the client systems and on servers that are topologically\n close on the network to the client systems. This should be done in\n conjunction with the network segmentation and filtering strategies mentioned\n above. \n\n Disable recursion\n Disable recursion on any nameserver responding to DNS requests made by\n untrusted systems. \n\n Implement source port randomization\n Vendors that implement DNS software are encouraged to review IETF Internet\n Draft, \"Measures for making DNS more resilient against forged answers,\" for\n additional information about implementing mitigations in their products. \n This document is a work in progress and may change prior to its publication\n as an RFC, if it is approved. \n\n\nIV. References\n\n * US-CERT Vulnerability Note VU#800113 -\n \u003chttp://www.kb.cert.org/vuls/id/800113\u003e\n * US-CERT Vulnerability Note VU#484649 -\n \u003chttp://www.kb.cert.org/vuls/id/484649\u003e\n * US-CERT Vulnerability Note VU#252735 -\n \u003chttp://www.kb.cert.org/vuls/id/252735\u003e\n * US-CERT Vulnerability Note VU#927905 -\n \u003chttp://www.kb.cert.org/vuls/id/927905\u003e\n * US-CERT Vulnerability Note VU#457875 -\n \u003chttp://www.kb.cert.org/vuls/id/457875\u003e\n * Internet Draft: Measures for making DNS more resilient against forged\n answers -\n \u003chttp://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience\u003e\n * RFC 3833 - \u003chttp://tools.ietf.org/html/rfc3833\u003e\n * RFC 2827 - \u003chttp://tools.ietf.org/html/rfc2827\u003e\n * RFC 3704 - \u003chttp://tools.ietf.org/html/rfc3704\u003e\n * RFC 3013 - \u003chttp://tools.ietf.org/html/rfc3013\u003e\n * Microsoft Security Bulletin MS08-037 -\n \u003chttp://www.microsoft.com/technet/security/bulletin/ms08-037.mspx\u003e\n * Internet Systems Consortium BIND Vulnerabilities -\n \u003chttp://www.isc.org/sw/bind/bind-security.php\u003e\n\n ____________________________________________________________________\n\n US-CERT thanks Dan Kaminsky of IOActive and Paul Vixie of Internet Systems\n Consortium (ISC) for notifying us about this problem and for helping us to\n construct this advisory. \n ____________________________________________________________________\n\n The most recent version of this document can be found at:\n\n \u003chttp://www.us-cert.gov/cas/techalerts/TA08-190B.html\u003e\n ____________________________________________________________________\n\n Feedback can be directed to US-CERT Technical Staff. Please send\n email to \u003ccert@cert.org\u003e with \"TA08-190B Feedback VU#800113\" in the\n subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2008 by US-CERT, a government organization. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Full Featured Secunia Network Software Inspector (NSI) is now\navailable:\nhttp://secunia.com/network_software_inspector/\n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications. \n\n----------------------------------------------------------------------\n\nTITLE:\nRed Hat update for bind\n\nSECUNIA ADVISORY ID:\nSA26195\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26195/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSpoofing\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nRed Hat Enterprise Linux (v. 5 server)\nhttp://secunia.com/product/13652/\nRed Hat Enterprise Linux Desktop (v. 5 client)\nhttp://secunia.com/product/13653/\nRed Hat Enterprise Linux Desktop Workstation (v. 5 client)\nhttp://secunia.com/product/13651/\nRedHat Enterprise Linux AS 2.1\nhttp://secunia.com/product/48/\nRedHat Enterprise Linux AS 3\nhttp://secunia.com/product/2534/\nRedHat Enterprise Linux AS 4\nhttp://secunia.com/product/4669/\nRedHat Enterprise Linux ES 2.1\nhttp://secunia.com/product/1306/\nRedHat Enterprise Linux ES 3\nhttp://secunia.com/product/2535/\nRedHat Enterprise Linux ES 4\nhttp://secunia.com/product/4668/\nRedHat Enterprise Linux WS 3\nhttp://secunia.com/product/2536/\nRedHat Enterprise Linux WS 2.1\nhttp://secunia.com/product/1044/\nRedHat Enterprise Linux WS 4\nhttp://secunia.com/product/4670/\nRedHat Linux Advanced Workstation 2.1 for Itanium\nhttp://secunia.com/product/1326/\n\nDESCRIPTION:\nRed Hat has issued an update for bind. \n\nFor more information:\nSA26152\n\nSOLUTION:\nUpdated packages are available from Red Hat Network. \nhttp://rhn.redhat.com\n\nORIGINAL ADVISORY:\nhttp://rhn.redhat.com/errata/RHSA-2007-0740.html\n\nOTHER REFERENCES:\nSA26152:\nhttp://secunia.com/advisories/26152/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. Security Advisory (08-AUG-2008) (CVE-2008-3280)\n===============================================\n\nBen Laurie of Google\u0027s Applied Security team, while working with an\nexternal researcher, Dr. Richard Clayton of the Computer Laboratory,\nCambridge University, found that various OpenID Providers (OPs) had\nTLS Server Certificates that used weak keys, as a result of the Debian\nPredictable Random Number Generator (CVE-2008-0166). \n\nIn combination with the DNS Cache Poisoning issue (CVE-2008-1447) and\nthe fact that almost all SSL/TLS implementations do not consult CRLs\n(currently an untracked issue), this means that it is impossible to\nrely on these OPs. \n\nAttack Description\n------------------\n\nIn order to mount an attack against a vulnerable OP, the attacker\nfirst finds the private key corresponding to the weak TLS\ncertificate. He then sets up a website masquerading as the original\nOP, both for the OpenID protocol and also for HTTP/HTTPS. \n\nThere are two cases, one is where the victim is a user trying to\nidentify themselves, in which case, even if they use HTTPS to \"ensure\"\nthat the site they are visiting is indeed their provider, they will be\nunable to detect the substitution and will give their login\ncredentials to the attacker. \n\nThe second case is where the victim is the Relying Party (RP). In this\ncase, even if the RP uses TLS to connect to the OP, as is recommended\nfor higher assurance, he will not be defended, as the vast majority of\nOpenID implementations do not check CRLs, and will, therefore, accept\nthe malicious site as the true OP. \n\nMitigation\n----------\n\nMitigation is surprisingly hard. In theory the vulnerable site should\nrevoke their weak certificate and issue a new one. \n\nHowever, since the CRLs will almost certainly not be checked, this\nmeans the site will still be vulnerable to attack for the lifetime of\nthe certificate (and perhaps beyond, depending on user\nbehaviour). Note that shutting down the site DOES NOT prevent the\nattack. \n\nTherefore mitigation falls to other parties. Until either 1 and 2 or 3 have been done, OpenID cannot be trusted\n for any OP that cannot demonstrate it has never had a weak\n certificate. \n\nDiscussion\n----------\n\nNormally, when security problems are encountered with a single piece\nof software, the responsible thing to do is to is to wait until fixes\nare available before making any announcement. However, as a number of\nexamples in the past have demonstrated, this approach does not work\nparticularly well when many different pieces of software are involved\nbecause it is necessary to coordinate a simultaneous release of the\nfixes, whilst hoping that the very large number of people involved\nwill cooperate in keeping the vulnerability secret. \n\nIn the present situation, the fixes will involve considerable\ndevelopment work in adding CRL handling to a great many pieces of\nopenID code. This is a far from trivial amount of work. \n\nThe fixes will also involve changes to browser preferences to ensure\nthat CRLs are checked by default -- which many vendors have resisted\nfor years. We are extremely pessimistic that a security vulnerability\nin OpenID will be seen as sufficiently important to change the browser\nvendors minds. \n\nHence, we see no value in delaying this announcement; and by making\nthe details public as soon as possible, we believe that individuals\nwho rely on OpenID will be better able to take their own individual\nsteps to avoid relying upon the flawed certificates we have\nidentified. \n\nOpenID is at heart quite a weak protocol, when used in its most\ngeneral form[1], and consequently there is very limited reliance upon\nits security. This means that the consequences of the combination of\nattacks that are now possible is nothing like as serious as might\notherwise have been the case. \n\nHowever, it does give an insight into the type of security disaster\nthat may occur in the future if we do not start to take CRLs\nseriously, but merely stick them onto \"to-do\" lists or disable them in\nthe name of tiny performance improvements. \n\nAffected Sites\n--------------\n\nThere is no central registry of OpenID systems, and so we cannot be\nsure that we have identified all of the weak certificates that are\ncurrently being served. The list of those we have found so far is:\n\nopenid.sun.com\nwww.xopenid.net\nopenid.net.nz\n\nNotes\n-----\n\n[1] There are ways of using OpenID that are significantly more secure\n than the commonly deployed scheme, I shall describe those in a\n separate article. \n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n\nRelease Date: 2008-07-16\nLast Updated: 2010-10-12\n\n ------------------------------------------------------------------------------\n\nPotential Security Impact: Remote DNS cache poisoning\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP-UX running BIND. \nHP-UX B.11.11, B.11.23, B.11.31 running BIND v9.3.2 or BIND v9.2.0, HP-UX B.11.11 running BIND v8.1.2\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2008-1447 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates / patch to resolve the vulnerabilities for BIND v9.2.0 and BIND v9.3.2. \n\nCustomers running BIND v8.1.2 on HP-UX B.11.11 should upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below. \n\nA new BIND v9.2.0 depot is available to address an issue encountered on HP-UX B.11.11. The new depot is available by contacting HP Support. \nThe patch PHNE_37865 is available from: http://itrc.hp.com\n\nThe BIND v9.3.2 updates are available for download from: http://software.hp.com\n\nHP-UX Release / Action\n\nB.11.11 running v8.1.2\n Upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates listed below, remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \n\nHP-UX Release / BIND Depot name / Action\n\nB.11.11 running v9.2.0 /\n BIND920V15.depot /\n Remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \n\nHP-UX Release / Action\n\nB.11.23 running v9.2.0 /\n Install PHNE_37865; Remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \n\nHP-UX Release / Action\n\nB.11.11 running v9.3.2 /\n Install revision C.9.3.2.7.0 or subsequent; Remove \"query-source port\" and \"query-source-v6 port\" options in\n\n/etc/named.conf. \n\nB.11.23 running v9.3.2 /\n Install revision C.9.3.2.7.0 or subsequent; Remove \"query-source port\" and \"query-source-v6 port\" options in\n\n/etc/named.conf. \n\nB.11.31 running v9.3.2 /\n Install revision C.9.3.2.3.0 or subsequent; Remove \"query-source port\" and \"query-source-v6 port\" options in\n\n/etc/named.conf. \n\nNote: Remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \n\nNote: Firewall configurations may need to be adjusted to allow DNS queries from random source ports to pass. In addition,\n\nfirewalls that forward DNS queries must not replace the random source ports. \n\nMANUAL ACTIONS: Yes - NonUpdate\nRemove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. Check firewall settings. \nFor B.11.11 running v8.1.2, upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates\nFor B.11.11 running v9.2.0 install BIND920v15.depot\n\nPRODUCT SPECIFIC INFORMATION\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It\n\nanalyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can\n\nalso download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa\n\nAFFECTED VERSIONS\n\nFor BIND v8.1.2\nHP-UX B.11.11\n=============\nInternetSrvcs.INETSVCS-RUN\naction: upgrade to BIND v9.2.0 or BIND v9.3.2 and apply the updates, remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \n\nFor BIND v9.3.2\nHP-UX B.11.11\n=============\nBindUpgrade.BIND-UPGRADE\naction: install revision C.9.3.2.7.0 or subsequent, remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \nURL: http://software.hp.com\n\nHP-UX B.11.23\n=============\nBindUpgrade.BIND-UPGRADE\nBindUpgrade.BIND2-UPGRADE\naction: install revision C.9.3.2.7.0 or subsequent, remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \nURL: http://software.hp.com\n\nHP-UX B.11.31\n=============\nNameService.BIND-AUX\nNameService.BIND-RUN\naction: install revision C.9.3.2.7.0 or subsequent, remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \nURL: http://software.hp.com\n\nFor BIND v9.2.0\nHP-UX B.11.11\n=============\nBINDv920.INETSVCS-BIND\naction: install revision B.11.11.01.015 or subsequent, remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \nURL Contact HP Support for information on where to download depot. \n\nHP-UX B.11.23\n=============\nInternetSrvcs.INETSVCS-INETD\nInternetSrvcs.INETSVCS-RUN\nInternetSrvcs.INETSVCS2-RUN\naction: install patch PHNE_37865 or subsequent, remove \"query-source port\" and \"query-source-v6 port\" options in /etc/named.conf. \nURL: http://itrc.hp.com\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 16 July 2008 Initial release\nVersion:2 (rev.2) - 19 July 2008 Added BIND v9.2.0 depot information\nVersion:3 (rev.3) - 06 August 2008 Updated patch location, revised BIND v9.2.0 depot information, added BIND v8.1.2\nVersion:4 (rev.4) - 08 August 2008 Updated manual actions to include named.conf and firewall configuration setings\nVersion:5 (rev.5) - 12 October 2010 Updated version for BIND v9.2.0 depot for B.11.11\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-1447"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "CERT/CC",
"id": "VU#252735"
},
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "BID",
"id": "30131"
},
{
"db": "VULMON",
"id": "CVE-2008-1447"
},
{
"db": "PACKETSTORM",
"id": "68039"
},
{
"db": "PACKETSTORM",
"id": "68068"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "PACKETSTORM",
"id": "68288"
},
{
"db": "PACKETSTORM",
"id": "69536"
},
{
"db": "PACKETSTORM",
"id": "68360"
},
{
"db": "PACKETSTORM",
"id": "68878"
},
{
"db": "PACKETSTORM",
"id": "68061"
},
{
"db": "PACKETSTORM",
"id": "58035"
},
{
"db": "PACKETSTORM",
"id": "68924"
},
{
"db": "PACKETSTORM",
"id": "94774"
}
],
"trust": 4.41
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=6122",
"trust": 0.3,
"type": "exploit"
},
{
"reference": "https://www.scap.org.cn/vuln/vhn-31572",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "VULMON",
"id": "CVE-2008-1447"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#800113",
"trust": 3.8
},
{
"db": "NVD",
"id": "CVE-2008-1447",
"trust": 3.8
},
{
"db": "BID",
"id": "30131",
"trust": 2.9
},
{
"db": "USCERT",
"id": "TA08-190B",
"trust": 2.7
},
{
"db": "SECUNIA",
"id": "30980",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "31014",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "30925",
"trust": 2.6
},
{
"db": "USCERT",
"id": "TA08-260A",
"trust": 2.6
},
{
"db": "USCERT",
"id": "TA08-190A",
"trust": 2.6
},
{
"db": "VUPEN",
"id": "ADV-2008-2025",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2009-0297",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2334",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2383",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2113",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2558",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2019",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2377",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2584",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2342",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2010-0622",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2166",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2051",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2092",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2029",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2384",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2268",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2052",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2549",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2197",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2009-0311",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2055",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2467",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2123",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2482",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2525",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2023",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2582",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2114",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2196",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2139",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2466",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2050",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2195",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2291",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2030",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020548",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020578",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020448",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020558",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020702",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020440",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020575",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020437",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020802",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020449",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020579",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020561",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020804",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020577",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020560",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020651",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020653",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020438",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020576",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31209",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31197",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31422",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "30977",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31151",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31354",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31093",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31212",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31207",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31221",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31254",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31451",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31169",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "30988",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "30973",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31687",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31199",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31137",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "30998",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31065",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31882",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31019",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31153",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31482",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31495",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "33178",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "33714",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31213",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31326",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31052",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31011",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31588",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31033",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31031",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31430",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "30979",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31022",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31094",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31030",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31204",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31072",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31152",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31237",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31012",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "33786",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31143",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31236",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31900",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "30989",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "31823",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "6130",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "6123",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "6122",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "26195",
"trust": 0.9
},
{
"db": "CERT/CC",
"id": "VU#252735",
"trust": 0.9
},
{
"db": "EXPLOIT-DB",
"id": "4266",
"trust": 0.8
},
{
"db": "USCERT",
"id": "SA08-190A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "68878",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68061",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68288",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "94774",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68068",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68039",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68360",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68038",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68755",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68412",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68118",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "73060",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68502",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "74443",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "96747",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68199",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68183",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68471",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "73732",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "70207",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68036",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68500",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68691",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68037",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68473",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68129",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68546",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68554",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68063",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68543",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-65607",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-31572",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2008-1447",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "69536",
"trust": 0.1
},
{
"db": "CERT/CC",
"id": "VU#484649",
"trust": 0.1
},
{
"db": "CERT/CC",
"id": "VU#457875",
"trust": 0.1
},
{
"db": "CERT/CC",
"id": "VU#927905",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58035",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68924",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#252735"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "VULMON",
"id": "CVE-2008-1447"
},
{
"db": "BID",
"id": "30131"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "PACKETSTORM",
"id": "68039"
},
{
"db": "PACKETSTORM",
"id": "68068"
},
{
"db": "PACKETSTORM",
"id": "94774"
},
{
"db": "PACKETSTORM",
"id": "68288"
},
{
"db": "PACKETSTORM",
"id": "69536"
},
{
"db": "PACKETSTORM",
"id": "68360"
},
{
"db": "PACKETSTORM",
"id": "68878"
},
{
"db": "PACKETSTORM",
"id": "68061"
},
{
"db": "PACKETSTORM",
"id": "58035"
},
{
"db": "PACKETSTORM",
"id": "68924"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"id": "VAR-200707-0675",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-31572"
}
],
"trust": 0.5363860340000001
},
"last_update_date": "2024-07-23T20:51:26.313000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "APPLE-SA-2008-09-12",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html"
},
{
"title": "APPLE-SA-2008-09-15",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html"
},
{
"title": "APPLE-SA-2008-07-31",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html"
},
{
"title": "APPLE-SA-2008-09-09",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html"
},
{
"title": "Security Update 2008-006",
"trust": 0.8,
"url": "http://support.apple.com/kb/ht3137"
},
{
"title": "Security Update 2008-005",
"trust": 0.8,
"url": "http://support.apple.com/kb/ht2647"
},
{
"title": "iPod touch v2.1",
"trust": 0.8,
"url": "http://support.apple.com/kb/ht3026"
},
{
"title": "bind-9.3.3-10.4AXS3",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=140"
},
{
"title": "dnsmasq-2.45-1AXS3.1.1",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=345"
},
{
"title": "cisco-sa-20080708-dns",
"trust": 0.8,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml"
},
{
"title": "20080709",
"trust": 0.8,
"url": "http://www.furukawa.co.jp/fitelnet/topic/vulnera_20080709.html"
},
{
"title": "DNS cache poisoning",
"trust": 0.8,
"url": "http://security.freebsd.org/advisories/freebsd-sa-08:06.bind.asc"
},
{
"title": "JVNVU800113",
"trust": 0.8,
"url": "http://www.centurysys.co.jp/support/xr_common/jvnvu800113.html"
},
{
"title": "HPSBUX02351",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01506861"
},
{
"title": "HPSBOV02357 SSRT080058",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01662368"
},
{
"title": "HPSBMP02404 SSRT090014",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01660723"
},
{
"title": "HPSBUX02358",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c01527346"
},
{
"title": "IZ26672",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1iz26672"
},
{
"title": "IZ26667",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1iz26667"
},
{
"title": "IZ26668",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1iz26668"
},
{
"title": "IZ26671",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1iz26671"
},
{
"title": "IZ26670",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1iz26670"
},
{
"title": "IZ26669",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1iz26669"
},
{
"title": "4525",
"trust": 0.8,
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=4525"
},
{
"title": "4338",
"trust": 0.8,
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=4338"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.iij.ad.jp"
},
{
"title": "CERT VU#800113 DNS Cache Poisoning Issue",
"trust": 0.8,
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"title": "956187",
"trust": 0.8,
"url": "http://www.microsoft.com/technet/security/advisory/956187.mspx"
},
{
"title": "MS08-037",
"trust": 0.8,
"url": "http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx"
},
{
"title": "1316",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1316"
},
{
"title": "1649",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1649"
},
{
"title": "1296",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1296"
},
{
"title": "1297",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1297"
},
{
"title": "NV08-008",
"trust": 0.8,
"url": "http://www.nec.co.jp/security-info/secinfo/nv08-008.html"
},
{
"title": "RHSA-2008:0789",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/rhsa-2008-0789.html"
},
{
"title": "RHSA-2008:0533",
"trust": 0.8,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0533.html"
},
{
"title": "VU800113",
"trust": 0.8,
"url": "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu800113.html"
},
{
"title": "239392",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-239392-1"
},
{
"title": "240048",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-240048-1"
},
{
"title": "dns_12",
"trust": 0.8,
"url": "http://fenics.fujitsu.com/products/support/2008/dns_12.html"
},
{
"title": "DNS\u306b\u95a2\u3059\u308b\u30ad\u30e3\u30c3\u30b7\u30e5\u30dd\u30a4\u30ba\u30cb\u30f3\u30b0\u8106\u5f31\u6027\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://www.allied-telesis.co.jp/support/list/faq/vuls/20080813.html"
},
{
"title": "956187",
"trust": 0.8,
"url": "http://www.microsoft.com/japan/technet/security/advisory/956187.mspx"
},
{
"title": "MS08-037",
"trust": 0.8,
"url": "http://www.microsoft.com/japan/technet/security/bulletin/ms08-037.mspx"
},
{
"title": "RHSA-2008:0533",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/rhsa/rhsa-2008-0533j.html"
},
{
"title": "RHSA-2008:0789",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/rhsa/rhsa-2008-0789j.html"
},
{
"title": "MS08-037e",
"trust": 0.8,
"url": "http://www.microsoft.com/japan/security/bulletins/ms08-037e.mspx"
},
{
"title": "TLSA-2008-26",
"trust": 0.8,
"url": "http://www.turbolinux.co.jp/security/2008/tlsa-2008-26j.txt"
},
{
"title": "TA08-190A",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-190a.html"
},
{
"title": "TA08-190B",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-190b.html"
},
{
"title": "Debian CVElist Bug Report Logs: dnsmasq: appears to be vulnerable to cache poisoning attack CVE-2008-1447",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=bea0103df57677c569776d970bb2ff1a"
},
{
"title": "Ubuntu Security Notice: bind9 vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-622-1"
},
{
"title": "Ubuntu Security Notice: dnsmasq vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-627-1"
},
{
"title": "Debian Security Advisories: DSA-1605-1 glibc -- DNS cache poisoning",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=26abd8c8b0e5ca972a55a1b90d3fdfc5"
},
{
"title": "Debian Security Advisories: DSA-1617-1 refpolicy -- incompatible policy",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=3418f614f56d497e28f842674f8d8f8c"
},
{
"title": "Debian Security Advisories: DSA-1603-1 bind9 -- DNS cache poisoning",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=23e55365f62c349622abb2d713a280af"
},
{
"title": "Debian CVElist Bug Report Logs: appears to be vulnerable to cache poisoning attack CVE-2008-1447",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=9e131108e982a49c97c4f3c5801dfb53"
},
{
"title": "Debian CVElist Bug Report Logs: python-dns vulnerable to CVE-2008-1447 DNS source port guessable",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2a465496dabf8f2d87b1ff911ad8df9b"
},
{
"title": "Symantec Security Advisories: SA26 : DNS Cache Poisoning Vulnerability (CERT VU#800113)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=078765ce503e834a2fa43ae116b70180"
},
{
"title": "Citrix Security Bulletins: Archive: Vulnerability in Access Gateway Standard and Advanced Edition Appliance firmware could result in DNS Cache Poisoning",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=df5619e77c6173020dc0459f4b4bf1f2"
},
{
"title": "Citrix Security Bulletins: Archive: Vulnerability in NetScaler and Access Gateway Enterprise Edition could result in DNS Cache Poisoning",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=5c63f9f5138045493cfb7d220588077b"
},
{
"title": "Ubuntu Security Notice: ruby1.8 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-651-1"
},
{
"title": "VMware Security Advisories: Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX, VMware VCB address information disclosure, privilege escalation and other security issues.",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=f3db6c283715ce027fe46e96804874b4"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-1447"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-331",
"trust": 1.1
},
{
"problemtype": "CWE-20",
"trust": 0.8
},
{
"problemtype": "CWE-310",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"trust": 2.7,
"url": "http://support.citrix.com/article/ctx117991"
},
{
"trust": 2.7,
"url": "http://support.citrix.com/article/ctx118183"
},
{
"trust": 2.6,
"url": "http://www.securityfocus.com/bid/30131"
},
{
"trust": 2.6,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-190a.html"
},
{
"trust": 2.6,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-190b.html"
},
{
"trust": 2.6,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-260a.html"
},
{
"trust": 2.1,
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"trust": 2.1,
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"trust": 2.1,
"url": "http://www.kb.cert.org/vuls/id/mimg-7dwr4j"
},
{
"trust": 2.1,
"url": "http://www.kb.cert.org/vuls/id/mimg-7ecl8q"
},
{
"trust": 2.1,
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/changelog"
},
{
"trust": 2.1,
"url": "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu800113.html"
},
{
"trust": 2.1,
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"trust": 2.1,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662368"
},
{
"trust": 2.1,
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"trust": 2.1,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0533.html"
},
{
"trust": 2.1,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"trust": 2.0,
"url": "http://www.ipcop.org/index.php?name=news\u0026file=article\u0026sid=40"
},
{
"trust": 1.8,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26667"
},
{
"trust": 1.8,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26668"
},
{
"trust": 1.8,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26669"
},
{
"trust": 1.8,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26670"
},
{
"trust": 1.8,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26671"
},
{
"trust": 1.8,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26672"
},
{
"trust": 1.8,
"url": "http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html"
},
{
"trust": 1.8,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html"
},
{
"trust": 1.8,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html"
},
{
"trust": 1.8,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"trust": 1.8,
"url": "http://www.cisco.com/en/us/products/products_security_advisory09186a00809c2168.shtml"
},
{
"trust": 1.8,
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"trust": 1.8,
"url": "http://support.apple.com/kb/ht3026"
},
{
"trust": 1.8,
"url": "http://support.apple.com/kb/ht3129"
},
{
"trust": 1.8,
"url": "http://wiki.rpath.com/wiki/advisories:rpsa-2008-0231"
},
{
"trust": 1.8,
"url": "http://wiki.rpath.com/wiki/advisories:rpsa-2010-0018"
},
{
"trust": 1.8,
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"trust": 1.8,
"url": "http://www.novell.com/support/viewcontent.do?externalid=7000912"
},
{
"trust": 1.8,
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"trust": 1.8,
"url": "http://www.vmware.com/security/advisories/vmsa-2008-0014.html"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"trust": 1.8,
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"trust": 1.8,
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"trust": 1.8,
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"trust": 1.8,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00402.html"
},
{
"trust": 1.8,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00458.html"
},
{
"trust": 1.8,
"url": "http://security.freebsd.org/advisories/freebsd-sa-08:06.bind.asc"
},
{
"trust": 1.8,
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-august/064118.html"
},
{
"trust": 1.8,
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"trust": 1.8,
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"trust": 1.8,
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"trust": 1.8,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01523520"
},
{
"trust": 1.8,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:139"
},
{
"trust": 1.8,
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"trust": 1.8,
"url": "http://www.caughq.org/exploits/cau-ex-2008-0002.txt"
},
{
"trust": 1.8,
"url": "http://www.caughq.org/exploits/cau-ex-2008-0003.txt"
},
{
"trust": 1.8,
"url": "http://www.doxpara.com/?p=1176"
},
{
"trust": 1.8,
"url": "http://www.doxpara.com/dmk_bo2k8.ppt"
},
{
"trust": 1.8,
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"trust": 1.8,
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"trust": 1.8,
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"trust": 1.8,
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"trust": 1.8,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12117"
},
{
"trust": 1.8,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5725"
},
{
"trust": 1.8,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5761"
},
{
"trust": 1.8,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5917"
},
{
"trust": 1.8,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9627"
},
{
"trust": 1.8,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0789.html"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020437"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020438"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020440"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020448"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020449"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020548"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020558"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020560"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020561"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020575"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020576"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020577"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020578"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020579"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020651"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020653"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020702"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020802"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020804"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/30925"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/30973"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/30977"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/30979"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/30980"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/30988"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/30989"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/30998"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31011"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31012"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31014"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31019"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31022"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31030"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31031"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31033"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31052"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31065"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31072"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31093"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31094"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31137"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31143"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31151"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31152"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31153"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31169"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31197"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31199"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31204"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31207"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31209"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31212"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31213"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31221"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31236"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31237"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31254"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31326"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31354"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31422"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31430"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31451"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31482"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31495"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31588"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31687"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31823"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31882"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/31900"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/33178"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/33714"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/33786"
},
{
"trust": 1.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"trust": 1.8,
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"trust": 1.8,
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"trust": 1.8,
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"trust": 1.8,
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"trust": 1.8,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"trust": 1.8,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"trust": 1.7,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026id=762152"
},
{
"trust": 1.7,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"trust": 1.7,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/rfc3833"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/rfc2827"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/rfc3704"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization"
},
{
"trust": 1.2,
"url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2008-009.txt.asc"
},
{
"trust": 1.0,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1447"
},
{
"trust": 0.9,
"url": "http://secunia.com/advisories/26195/"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1447"
},
{
"trust": 0.8,
"url": "http://csrc.nist.gov/publications/nistpubs/800-81/sp800-81.pdf"
},
{
"trust": 0.8,
"url": "http://tools.ietf.org/html/rfc3013"
},
{
"trust": 0.8,
"url": "http://tools.ietf.org/html/rfc4033"
},
{
"trust": 0.8,
"url": "http://cr.yp.to/djbdns/dns_random.html"
},
{
"trust": 0.8,
"url": "http://cr.yp.to/djbdns/dns_transmit.html"
},
{
"trust": 0.8,
"url": "http://cr.yp.to/djbdns/forgery.html"
},
{
"trust": 0.8,
"url": "http://www.trusteer.com/microsoftdns"
},
{
"trust": 0.8,
"url": "http://www.trusteer.com/bind9dns"
},
{
"trust": 0.8,
"url": "http://www.trusteer.com/bind8dns"
},
{
"trust": 0.8,
"url": "http://www.sans.org/reading_room/whitepapers/dns/1567.php"
},
{
"trust": 0.8,
"url": "http://blogs.iss.net/archive/morednsnat.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/cert/jvnvu800113/"
},
{
"trust": 0.8,
"url": "http://www.cert.at/static/cert.at-0802-dns-patchanalysis.pdf"
},
{
"trust": 0.8,
"url": "http://www.isc.org/sw/bind/bind-security.php"
},
{
"trust": 0.8,
"url": "http://www.trusteer.com/docs/bind9dns.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu%23252735/index.html"
},
{
"trust": 0.8,
"url": "http://www.milw0rm.com/exploits/4266"
},
{
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=307041"
},
{
"trust": 0.8,
"url": "http://www.frsirt.com/english/advisories/2008/2019"
},
{
"trust": 0.8,
"url": "http://www.frsirt.com/english/advisories/2008/2055"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/vuln/documents/2008/200812_dns.html"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/vuln/documents/2009/200912_dns.html"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/vuln/documents/2008/200809_dns.html"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2008/at080013.txt"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2008/at080014.txt"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2014/at140016.html"
},
{
"trust": 0.8,
"url": "http://jprs.jp/tech/security/2014-04-15-portrandomization.html"
},
{
"trust": 0.8,
"url": "http://jprs.jp/tech/security/2014-05-30-poisoning-countermeasure-auth-1.pdf"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu800113/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta08-190a/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta08-190b/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta08-190a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta08-190b/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1447"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/30925/"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/31014/"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/30980/"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/alerts/sa08-190a.html"
},
{
"trust": 0.8,
"url": "http://www.cyberpolice.go.jp/important/2009/20090212_155349.html"
},
{
"trust": 0.4,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml"
},
{
"trust": 0.4,
"url": "http://www.itrc.hp.com/service/cki/secbullarchive.do"
},
{
"trust": 0.4,
"url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc"
},
{
"trust": 0.4,
"url": "https://www.hp.com/go/swa"
},
{
"trust": 0.4,
"url": "http://h30046.www3.hp.com/subsignin.php"
},
{
"trust": 0.3,
"url": "http://blogs.sun.com/security/entry/isrs_available_for_bind_dns"
},
{
"trust": 0.3,
"url": "http://support.apple.com/kb/ht3137"
},
{
"trust": 0.3,
"url": "http://blog.ncircle.com/blogs/sync/archives/2008/08/apple_dns_patch_fails_to_rando.html"
},
{
"trust": 0.3,
"url": "http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.5-p2"
},
{
"trust": 0.3,
"url": "http://www.isc.org/index.pl?/sw/bind/view/?release=9.4.2-p2"
},
{
"trust": 0.3,
"url": "http://www.isc.org/index.pl?/sw/bind/view/?release=9.5.0-p2"
},
{
"trust": 0.3,
"url": "http://www.bluecatnetworks.com/clientsupport/"
},
{
"trust": 0.3,
"url": "http://www.checkpoint.com"
},
{
"trust": 0.3,
"url": "http://www.tinydns.org/"
},
{
"trust": 0.3,
"url": "http://blog.metasploit.com/2008/07/on-dns-attacks-in-wild-and-journalistic.html"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/web/about/security/intelligence/dns-bcp.html"
},
{
"trust": 0.3,
"url": "http://www.securebits.org/dnsmre.html"
},
{
"trust": 0.3,
"url": "http://www.f5.com/products/big-ip/"
},
{
"trust": 0.3,
"url": "http://www.f5.com/"
},
{
"trust": 0.3,
"url": "http://support.citrix.com/article/ctx116762"
},
{
"trust": 0.3,
"url": "http://www.sec-consult.com/files/whitepaper-dns-node-redelegation.pdf"
},
{
"trust": 0.3,
"url": "http://www.us-cert.gov/current/index.html#internet_system_consortium_releases_bind"
},
{
"trust": 0.3,
"url": "http://www.ipcop.org/"
},
{
"trust": 0.3,
"url": "http://www.microsoft.com/windows/default.mspx"
},
{
"trust": 0.3,
"url": "http://www.openbsd.org/errata42.html"
},
{
"trust": 0.3,
"url": "http://www.openbsd.org/errata43.html"
},
{
"trust": 0.3,
"url": "http://www.ingate.com/relnote-464.php"
},
{
"trust": 0.3,
"url": "http://darkoz.com/?p=15"
},
{
"trust": 0.3,
"url": "http://www.bluecatnetworks.com/"
},
{
"trust": 0.3,
"url": "http://f5.com/products/firepass/"
},
{
"trust": 0.3,
"url": "http://www.vmware.com"
},
{
"trust": 0.3,
"url": "http://www.windriver.com/"
},
{
"trust": 0.3,
"url": "http://www.zonealarm.com/"
},
{
"trust": 0.3,
"url": "/archive/1/500540"
},
{
"trust": 0.3,
"url": "/archive/1/495304"
},
{
"trust": 0.3,
"url": "/archive/1/494716"
},
{
"trust": 0.3,
"url": "/archive/1/494055"
},
{
"trust": 0.3,
"url": "/archive/1/495034"
},
{
"trust": 0.3,
"url": "/archive/1/494305"
},
{
"trust": 0.3,
"url": "/archive/1/494493"
},
{
"trust": 0.3,
"url": "/archive/1/494108"
},
{
"trust": 0.3,
"url": "/archive/1/494818"
},
{
"trust": 0.3,
"url": "/archive/1/495212"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/elmodocs2/security/asa-2008-288.htm"
},
{
"trust": 0.3,
"url": "http://hypersonic.bluecoat.com/support/securityadvisories/dns_cache_poisoning"
},
{
"trust": 0.3,
"url": "http://www13.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c01660723"
},
{
"trust": 0.3,
"url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04530690 "
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1iz26670"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/mimg-7dwr4z"
},
{
"trust": 0.3,
"url": "http://www.microsoft.com/technet/security/advisory/956187.mspx"
},
{
"trust": 0.3,
"url": "http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx"
},
{
"trust": 0.3,
"url": "http://www1.alcatel-lucent.com/psirt/statements/2008003/dnscache.htm"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/mapg-7g7nuc"
},
{
"trust": 0.3,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026documentoid=762152\u0026poid="
},
{
"trust": 0.3,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026id=751322"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0789.html"
},
{
"trust": 0.3,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-240048-1"
},
{
"trust": 0.3,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-245206-1"
},
{
"trust": 0.3,
"url": "http://www.novell.com/support/viewcontent.do?externalid=7000912\u0026sliceid=1"
},
{
"trust": 0.3,
"url": "http://up2date.astaro.com/2008/09/up2date_6314_released.html"
},
{
"trust": 0.3,
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026id=4527"
},
{
"trust": 0.3,
"url": "http://software.hp.com"
},
{
"trust": 0.2,
"url": "http://secunia.com/"
},
{
"trust": 0.2,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.2,
"url": "http://itrc.hp.com"
},
{
"trust": 0.1,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026amp;id=762152"
},
{
"trust": 0.1,
"url": "http://www.ipcop.org/index.php?name=news\u0026amp;file=article\u0026amp;sid=40"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=123324863916385\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=141879471518471\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=121866517322103\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=121630706004256\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2008\u0026amp;m=slackware-security.539239"
},
{
"trust": 0.1,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2008\u0026amp;m=slackware-security.452680"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/331.html"
},
{
"trust": 0.1,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/622-1/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.exploit-db.com/exploits/6122/"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/web/about/security/intelligence/dns-bcp.html."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/prod_warranties_item09186a008088e31f.html,"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/pcgi-bin/software/tablebuild/tablebuild.pl/nr-eval"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/pcgi-bin/tablebuild.pl/acns55"
},
{
"trust": 0.1,
"url": "http://www.cisco.com."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt."
},
{
"trust": 0.1,
"url": "https://www.example.com"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/687/directory/dirtac.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/public/sw-center/sw-usingswc.shtml."
},
{
"trust": 0.1,
"url": "http://intellishield.cisco.com/security/alertmanager/cvss"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1006356"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005896"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5503"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3698"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1807"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1055"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/esx/esx350-200806203-ug.zip"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5438"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3696"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004824"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1005117.tgz"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004824.tgz"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3696"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos_vi.html"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005111"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1004823"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1005108.tgz"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005113"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/player/"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3697"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3698"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/security"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5269"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1808"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx303-200808406-sg.zip"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1005114.tgz"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/ws/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3691"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos.html"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005114"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/server/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3693"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx303-200808403-sg.zip"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1807"
},
{
"trust": 0.1,
"url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1806"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3694"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005112"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3695"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/ws/ws5.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3692"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3697"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005109"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3695"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005108"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1808"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx303-200808404-sg.zip"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2101"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1806"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1006357"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/security_response.html"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1005113.tgz"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2101"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1006034"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1006035"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1006356.tgz"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5503"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1005117"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3693"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1005112.tgz"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5269"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/download/ace/"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1005109.tgz"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3694"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1004823.tgz"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1005111.tgz"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3691"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5438"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3692"
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/800113\u003e"
},
{
"trust": 0.1,
"url": "http://tools.ietf.org/html/rfc3704\u003e"
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/252735\u003e"
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/927905\u003e"
},
{
"trust": 0.1,
"url": "http://tools.ietf.org/html/rfc2827\u003e"
},
{
"trust": 0.1,
"url": "http://tools.ietf.org/html/rfc3013\u003e"
},
{
"trust": 0.1,
"url": "http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience\u003e"
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/484649\u003e"
},
{
"trust": 0.1,
"url": "http://www.isc.org/sw/bind/bind-security.php\u003e"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-190b.html\u003e"
},
{
"trust": 0.1,
"url": "http://tools.ietf.org/html/rfc3833\u003e"
},
{
"trust": 0.1,
"url": "http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx\u003e"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/cas/signup.html\u003e."
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/legal.html\u003e"
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/457875\u003e"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/2536/"
},
{
"trust": 0.1,
"url": "http://rhn.redhat.com/errata/rhsa-2007-0740.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/network_software_inspector/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/2535/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/13653/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/48/"
},
{
"trust": 0.1,
"url": "http://rhn.redhat.com"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/13651/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4669/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4668/"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/13652/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/1326/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/26152/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/1306/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4670/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/2534/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/1044/"
},
{
"trust": 0.1,
"url": "https://www.xopenid.net"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3280"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0166"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#252735"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "VULMON",
"id": "CVE-2008-1447"
},
{
"db": "BID",
"id": "30131"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "PACKETSTORM",
"id": "68039"
},
{
"db": "PACKETSTORM",
"id": "68068"
},
{
"db": "PACKETSTORM",
"id": "94774"
},
{
"db": "PACKETSTORM",
"id": "68288"
},
{
"db": "PACKETSTORM",
"id": "69536"
},
{
"db": "PACKETSTORM",
"id": "68360"
},
{
"db": "PACKETSTORM",
"id": "68878"
},
{
"db": "PACKETSTORM",
"id": "68061"
},
{
"db": "PACKETSTORM",
"id": "58035"
},
{
"db": "PACKETSTORM",
"id": "68924"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#252735"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "VULMON",
"id": "CVE-2008-1447"
},
{
"db": "BID",
"id": "30131"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "PACKETSTORM",
"id": "68039"
},
{
"db": "PACKETSTORM",
"id": "68068"
},
{
"db": "PACKETSTORM",
"id": "94774"
},
{
"db": "PACKETSTORM",
"id": "68288"
},
{
"db": "PACKETSTORM",
"id": "69536"
},
{
"db": "PACKETSTORM",
"id": "68360"
},
{
"db": "PACKETSTORM",
"id": "68878"
},
{
"db": "PACKETSTORM",
"id": "68061"
},
{
"db": "PACKETSTORM",
"id": "58035"
},
{
"db": "PACKETSTORM",
"id": "68924"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-07-08T00:00:00",
"db": "CERT/CC",
"id": "VU#800113"
},
{
"date": "2007-07-27T00:00:00",
"db": "CERT/CC",
"id": "VU#252735"
},
{
"date": "2008-07-08T00:00:00",
"db": "VULHUB",
"id": "VHN-31572"
},
{
"date": "2008-07-08T00:00:00",
"db": "VULMON",
"id": "CVE-2008-1447"
},
{
"date": "2008-07-08T00:00:00",
"db": "BID",
"id": "30131"
},
{
"date": "2008-07-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"date": "2008-07-10T06:26:35",
"db": "PACKETSTORM",
"id": "68039"
},
{
"date": "2008-07-10T07:29:30",
"db": "PACKETSTORM",
"id": "68068"
},
{
"date": "2010-10-15T02:12:40",
"db": "PACKETSTORM",
"id": "94774"
},
{
"date": "2008-07-17T19:16:48",
"db": "PACKETSTORM",
"id": "68288"
},
{
"date": "2008-08-31T23:44:00",
"db": "PACKETSTORM",
"id": "69536"
},
{
"date": "2008-07-21T19:44:10",
"db": "PACKETSTORM",
"id": "68360"
},
{
"date": "2008-08-06T21:52:19",
"db": "PACKETSTORM",
"id": "68878"
},
{
"date": "2008-07-10T07:07:50",
"db": "PACKETSTORM",
"id": "68061"
},
{
"date": "2007-07-26T04:26:32",
"db": "PACKETSTORM",
"id": "58035"
},
{
"date": "2008-08-08T20:46:25",
"db": "PACKETSTORM",
"id": "68924"
},
{
"date": "2008-07-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"date": "2008-07-08T23:41:00",
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-04-14T00:00:00",
"db": "CERT/CC",
"id": "VU#800113"
},
{
"date": "2008-08-06T00:00:00",
"db": "CERT/CC",
"id": "VU#252735"
},
{
"date": "2020-03-24T00:00:00",
"db": "VULHUB",
"id": "VHN-31572"
},
{
"date": "2020-03-24T00:00:00",
"db": "VULMON",
"id": "CVE-2008-1447"
},
{
"date": "2015-04-13T21:35:00",
"db": "BID",
"id": "30131"
},
{
"date": "2014-06-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"date": "2020-03-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"date": "2020-03-24T18:19:46.383000",
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "68068"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
}
],
"trust": 0.7
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple DNS implementations vulnerable to cache poisoning",
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "security feature problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
}
],
"trust": 0.6
}
}
GSD-2008-1447
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2008-1447",
"description": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"",
"id": "GSD-2008-1447",
"references": [
"https://www.suse.com/security/cve/CVE-2008-1447.html",
"https://www.debian.org/security/2008/dsa-1623",
"https://www.debian.org/security/2008/dsa-1619",
"https://www.debian.org/security/2008/dsa-1617",
"https://www.debian.org/security/2008/dsa-1605",
"https://www.debian.org/security/2008/dsa-1604",
"https://www.debian.org/security/2008/dsa-1603",
"https://access.redhat.com/errata/RHSA-2008:0789",
"https://access.redhat.com/errata/RHSA-2008:0533",
"https://linux.oracle.com/cve/CVE-2008-1447.html",
"https://packetstormsecurity.com/files/cve/CVE-2008-1447"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-1447"
],
"details": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\"",
"id": "GSD-2008-1447",
"modified": "2023-12-13T01:23:02.966860Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-1447",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1020438",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020438"
},
{
"name": "FEDORA-2008-6256",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
},
{
"name": "SUSE-SR:2008:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"name": "VU#800113",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"name": "31137",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31137"
},
{
"name": "31430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31430"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
},
{
"name": "31169",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31169"
},
{
"name": "http://www.phys.uu.nl/~rombouts/pdnsd.html",
"refsource": "CONFIRM",
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"name": "1020702",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020702"
},
{
"name": "GLSA-201209-25",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name": "ADV-2008-2052",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"name": "1020561",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020561"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"name": "HPSBOV03226",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "1020578",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020578"
},
{
"name": "FreeBSD-SA-08:06",
"refsource": "FREEBSD",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"name": "oval:org.mitre.oval:def:9627",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
},
{
"name": "1020802",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020802"
},
{
"name": "HPSBMP02404",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "30131",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30131"
},
{
"name": "[4.2] 013: SECURITY FIX: July 23, 2008",
"refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"name": "31236",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31236"
},
{
"name": "APPLE-SA-2008-09-15",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"name": "1020651",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020651"
},
{
"name": "1020437",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020437"
},
{
"name": "31209",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31209"
},
{
"name": "31012",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31012"
},
{
"name": "31151",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31151"
},
{
"name": "ADV-2008-2050",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"name": "http://support.citrix.com/article/CTX117991",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX117991"
},
{
"name": "SSRT101004",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "31237",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31237"
},
{
"name": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog",
"refsource": "CONFIRM",
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
},
{
"name": "APPLE-SA-2008-07-31",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"name": "win-dns-client-server-spoofing(43334)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"name": "31495",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31495"
},
{
"name": "6130",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"name": "20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
},
{
"name": "1020579",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020579"
},
{
"name": "http://www.nominum.com/asset_upload_file741_2661.pdf",
"refsource": "MISC",
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"name": "1020653",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020653"
},
{
"name": "30998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30998"
},
{
"name": "DSA-1603",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"name": "ADV-2008-2525",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"name": "SUSE-SA:2008:033",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"name": "31094",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31094"
},
{
"name": "IZ26668",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"name": "31687",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31687"
},
{
"name": "ADV-2008-2025",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"name": "239392",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"name": "TA08-260A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"name": "31588",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31588"
},
{
"name": "31019",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31019"
},
{
"name": "ADV-2008-2029",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"name": "SSRT080058",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "6123",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"name": "IZ26671",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"name": "FEDORA-2008-6281",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
},
{
"name": "ADV-2008-2268",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"name": "ADV-2009-0297",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"name": "HPSBUX02351",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "31207",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31207"
},
{
"name": "31031",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31031"
},
{
"name": "ADV-2008-2584",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"name": "31451",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31451"
},
{
"name": "ADV-2008-2051",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"name": "30977",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30977"
},
{
"name": "RHSA-2008:0789",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
},
{
"name": "ADV-2008-2377",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"name": "HPSBNS02405",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"name": "1020558",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020558"
},
{
"name": "31221",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31221"
},
{
"name": "RHSA-2008:0533",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"name": "[4.3] 004: SECURITY FIX: July 23, 2008",
"refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"name": "1020804",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020804"
},
{
"name": "31143",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31143"
},
{
"name": "20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"name": "ADV-2008-2195",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"name": "ADV-2008-2196",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"name": "33714",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33714"
},
{
"name": "HPSBTU02358",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"name": "33786",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33786"
},
{
"name": "1020448",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020448"
},
{
"name": "31882",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31882"
},
{
"name": "ADV-2008-2384",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"name": "IZ26669",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"name": "http://up2date.astaro.com/2008/08/up2date_7202_released.html",
"refsource": "CONFIRM",
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"name": "ADV-2008-2123",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"name": "http://support.apple.com/kb/HT3026",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3026"
},
{
"name": "31014",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31014"
},
{
"name": "30979",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30979"
},
{
"name": "1020575",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020575"
},
{
"name": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
"refsource": "CONFIRM",
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "ADV-2008-2482",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"name": "IZ26672",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"name": "http://support.apple.com/kb/HT3129",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3129"
},
{
"name": "DSA-1619",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"name": "ADV-2008-2166",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"name": "31072",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31072"
},
{
"name": "ADV-2008-2139",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"name": "oval:org.mitre.oval:def:5761",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
},
{
"name": "ADV-2008-2092",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"name": "31482",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31482"
},
{
"name": "IZ26670",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"name": "MDVSA-2008:139",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
},
{
"name": "oval:org.mitre.oval:def:5917",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
},
{
"name": "30989",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30989"
},
{
"name": "ADV-2008-2055",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"name": "SSRT071449",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152",
"refsource": "CONFIRM",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152"
},
{
"name": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40",
"refsource": "CONFIRM",
"url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40"
},
{
"name": "31065",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31065"
},
{
"name": "31254",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31254"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"name": "http://www.doxpara.com/?p=1176",
"refsource": "MISC",
"url": "http://www.doxpara.com/?p=1176"
},
{
"name": "NetBSD-SA2008-009",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
},
{
"name": "USN-627-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"name": "ADV-2010-0622",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name": "1020576",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020576"
},
{
"name": "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
"refsource": "CONFIRM",
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"name": "HPSBOV02357",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
},
{
"name": "31153",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31153"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
},
{
"name": "ADV-2008-2549",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"name": "IZ26667",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html",
"refsource": "CONFIRM",
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"name": "31213",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31213"
},
{
"name": "31030",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31030"
},
{
"name": "USN-622-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"name": "31033",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31033"
},
{
"name": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html",
"refsource": "MISC",
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"name": "1020440",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020440"
},
{
"name": "APPLE-SA-2008-09-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"name": "http://www.doxpara.com/DMK_BO2K8.ppt",
"refsource": "MISC",
"url": "http://www.doxpara.com/DMK_BO2K8.ppt"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"name": "DSA-1604",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"name": "31823",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31823"
},
{
"name": "31326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31326"
},
{
"name": "ADV-2008-2558",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"name": "6122",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"name": "oval:org.mitre.oval:def:5725",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
},
{
"name": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt",
"refsource": "MISC",
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
},
{
"name": "cisco-multiple-dns-cache-poisoning(43637)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"name": "ADV-2008-2383",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"name": "1020560",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020560"
},
{
"name": "31900",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31900"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
},
{
"name": "http://support.citrix.com/article/CTX118183",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX118183"
},
{
"name": "30925",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30925"
},
{
"name": "ADV-2009-0311",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
},
{
"name": "DSA-1623",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"name": "ADV-2008-2582",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"name": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt",
"refsource": "MISC",
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
},
{
"name": "DSA-1605",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7000912",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
},
{
"name": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning",
"refsource": "CONFIRM",
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"name": "ADV-2008-2342",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"name": "ADV-2008-2114",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"name": "30973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30973"
},
{
"name": "31204",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31204"
},
{
"name": "31354",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31354"
},
{
"name": "GLSA-200812-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "oval:org.mitre.oval:def:12117",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
},
{
"name": "33178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33178"
},
{
"name": "30988",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30988"
},
{
"name": "APPLE-SA-2008-09-09",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"name": "31011",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31011"
},
{
"name": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html",
"refsource": "MISC",
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"name": "ADV-2008-2334",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "1020577",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020577"
},
{
"name": "31422",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31422"
},
{
"name": "31197",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31197"
},
{
"name": "1020548",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020548"
},
{
"name": "ADV-2008-2467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"name": "240048",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"name": "TA08-190B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
},
{
"name": "TA08-190A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
},
{
"name": "GLSA-200807-08",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"name": "31022",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31022"
},
{
"name": "SSA:2008-191",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"name": "1020449",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020449"
},
{
"name": "31093",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31093"
},
{
"name": "31052",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31052"
},
{
"name": "30980",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30980"
},
{
"name": "SSA:2008-205-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "31199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31199"
},
{
"name": "ADV-2008-2030",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"name": "ADV-2008-2291",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"name": "ADV-2008-2023",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"name": "SSRT090014",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "ADV-2008-2466",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"name": "MS08-037",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"name": "31212",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31212"
},
{
"name": "ADV-2008-2113",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"name": "31152",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31152"
},
{
"name": "ADV-2008-2019",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"name": "ADV-2008-2197",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-1447"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-331"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-1603",
"refsource": "DEBIAN",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"name": "DSA-1604",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"name": "DSA-1605",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"name": "USN-622-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"name": "TA08-190B",
"refsource": "CERT",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
},
{
"name": "VU#800113",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"name": "1020438",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020438"
},
{
"name": "1020440",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020440"
},
{
"name": "1020437",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020437"
},
{
"name": "31207",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31207"
},
{
"name": "239392",
"refsource": "SUNALERT",
"tags": [
"Third Party Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"name": "RHSA-2008:0533",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"name": "31237",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31237"
},
{
"name": "IZ26668",
"refsource": "AIXAPAR",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"name": "IZ26669",
"refsource": "AIXAPAR",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"name": "NetBSD-SA2008-009",
"refsource": "NETBSD",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
},
{
"name": "http://www.doxpara.com/DMK_BO2K8.ppt",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://www.doxpara.com/DMK_BO2K8.ppt"
},
{
"name": "30989",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30989"
},
{
"name": "FEDORA-2008-6281",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
},
{
"name": "31094",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31094"
},
{
"name": "APPLE-SA-2008-07-31",
"refsource": "APPLE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
},
{
"name": "http://www.nominum.com/asset_upload_file741_2661.pdf",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"name": "31197",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31197"
},
{
"name": "31137",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31137"
},
{
"name": "31254",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31254"
},
{
"name": "1020561",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020561"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"name": "SSRT080058",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"name": "DSA-1619",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"name": "30988",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30988"
},
{
"name": "31033",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31033"
},
{
"name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource": "FULLDISC",
"tags": [
"Broken Link"
],
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"name": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"name": "1020578",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020578"
},
{
"name": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html",
"refsource": "MISC",
"tags": [
"Technical Description"
],
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"name": "http://www.doxpara.com/?p=1176",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://www.doxpara.com/?p=1176"
},
{
"name": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "31052",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31052"
},
{
"name": "http://support.citrix.com/article/CTX117991",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.citrix.com/article/CTX117991"
},
{
"name": "31169",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31169"
},
{
"name": "http://up2date.astaro.com/2008/08/up2date_7202_released.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"name": "MDVSA-2008:139",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
},
{
"name": "[4.3] 004: SECURITY FIX: July 23, 2008",
"refsource": "OPENBSD",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"name": "IZ26667",
"refsource": "AIXAPAR",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"name": "31152",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31152"
},
{
"name": "1020560",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020560"
},
{
"name": "31221",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31221"
},
{
"name": "30925",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30925"
},
{
"name": "31093",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31093"
},
{
"name": "30973",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30973"
},
{
"name": "31354",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31354"
},
{
"name": "1020577",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020577"
},
{
"name": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ipcop.org/index.php?name=News\u0026file=article\u0026sid=40"
},
{
"name": "31151",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31151"
},
{
"name": "31019",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31019"
},
{
"name": "APPLE-SA-2008-09-09",
"refsource": "APPLE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"name": "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"name": "31143",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31143"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
},
{
"name": "30980",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30980"
},
{
"name": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
},
{
"name": "30977",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30977"
},
{
"name": "SUSE-SA:2008:033",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"name": "1020575",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020575"
},
{
"name": "1020802",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020802"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026id=762152"
},
{
"name": "31451",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31451"
},
{
"name": "FEDORA-2008-6256",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
},
{
"name": "31031",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31031"
},
{
"name": "SSA:2008-205-01",
"refsource": "SLACKWARE",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"name": "30131",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/30131"
},
{
"name": "IZ26672",
"refsource": "AIXAPAR",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"name": "31212",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31212"
},
{
"name": "31236",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31236"
},
{
"name": "IZ26671",
"refsource": "AIXAPAR",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"name": "31209",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31209"
},
{
"name": "SUSE-SR:2008:017",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"name": "240048",
"refsource": "SUNALERT",
"tags": [
"Third Party Advisory"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"name": "GLSA-200807-08",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"name": "31011",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31011"
},
{
"name": "1020576",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020576"
},
{
"name": "31326",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31326"
},
{
"name": "[4.2] 013: SECURITY FIX: July 23, 2008",
"refsource": "OPENBSD",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"name": "TA08-190A",
"refsource": "CERT",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
},
{
"name": "1020558",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020558"
},
{
"name": "31014",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31014"
},
{
"name": "DSA-1623",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"name": "31199",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31199"
},
{
"name": "1020579",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020579"
},
{
"name": "31204",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31204"
},
{
"name": "31072",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31072"
},
{
"name": "30979",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30979"
},
{
"name": "30998",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30998"
},
{
"name": "31213",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31213"
},
{
"name": "31153",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31153"
},
{
"name": "FreeBSD-SA-08:06",
"refsource": "FREEBSD",
"tags": [
"Third Party Advisory"
],
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"name": "IZ26670",
"refsource": "AIXAPAR",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"name": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"name": "31687",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31687"
},
{
"name": "APPLE-SA-2008-09-15",
"refsource": "APPLE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"name": "APPLE-SA-2008-09-12",
"refsource": "APPLE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"name": "http://support.apple.com/kb/HT3129",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT3129"
},
{
"name": "31588",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31588"
},
{
"name": "31900",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31900"
},
{
"name": "31882",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31882"
},
{
"name": "31823",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31823"
},
{
"name": "http://www.phys.uu.nl/~rombouts/pdnsd.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"name": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
},
{
"name": "1020653",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020653"
},
{
"name": "1020651",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020651"
},
{
"name": "31422",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31422"
},
{
"name": "RHSA-2008:0789",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
},
{
"name": "1020548",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020548"
},
{
"name": "http://support.citrix.com/article/CTX118183",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.citrix.com/article/CTX118183"
},
{
"name": "31030",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31030"
},
{
"name": "1020448",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020448"
},
{
"name": "31012",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31012"
},
{
"name": "1020702",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020702"
},
{
"name": "http://support.apple.com/kb/HT3026",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT3026"
},
{
"name": "31022",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31022"
},
{
"name": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
},
{
"name": "1020804",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020804"
},
{
"name": "SSA:2008-191",
"refsource": "SLACKWARE",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
},
{
"name": "31065",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31065"
},
{
"name": "TA08-260A",
"refsource": "CERT",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7000912",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
},
{
"name": "1020449",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1020449"
},
{
"name": "GLSA-200812-17",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "33178",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33178"
},
{
"name": "31482",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31482"
},
{
"name": "HPSBTU02358",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"name": "31430",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31430"
},
{
"name": "31495",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/31495"
},
{
"name": "HPSBOV02357",
"refsource": "HP",
"tags": [
"Broken Link"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
},
{
"name": "HPSBMP02404",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"name": "33714",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33714"
},
{
"name": "33786",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/33786"
},
{
"name": "HPSBNS02405",
"refsource": "HP",
"tags": [
"Broken Link"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
},
{
"name": "ADV-2010-0622",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
},
{
"name": "ADV-2008-2195",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"name": "ADV-2008-2019",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"name": "ADV-2008-2558",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"name": "ADV-2008-2092",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"name": "ADV-2008-2123",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"name": "ADV-2008-2113",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"name": "ADV-2008-2025",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"name": "ADV-2008-2139",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"name": "ADV-2008-2029",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"name": "ADV-2008-2549",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"name": "ADV-2008-2334",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "ADV-2008-2467",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"name": "ADV-2008-2030",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"name": "ADV-2008-2384",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"name": "ADV-2008-2482",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"name": "ADV-2008-2377",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"name": "ADV-2008-2342",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"name": "ADV-2009-0297",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"name": "ADV-2008-2166",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"name": "ADV-2008-2466",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"name": "ADV-2008-2055",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"name": "ADV-2009-0311",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"name": "ADV-2008-2383",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"name": "ADV-2008-2196",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"name": "ADV-2008-2197",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
},
{
"name": "ADV-2008-2050",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"name": "ADV-2008-2023",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"name": "ADV-2008-2114",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"name": "ADV-2008-2051",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"name": "ADV-2008-2291",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"name": "ADV-2008-2525",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"name": "ADV-2008-2584",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"name": "ADV-2008-2268",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"name": "ADV-2008-2582",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"name": "ADV-2008-2052",
"refsource": "VUPEN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"name": "USN-627-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"name": "GLSA-201209-25",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name": "HPSBOV03226",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"name": "20080708 Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks",
"refsource": "CISCO",
"tags": [
"Third Party Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
},
{
"name": "cisco-multiple-dns-cache-poisoning(43637)",
"refsource": "XF",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"name": "win-dns-client-server-spoofing(43334)",
"refsource": "XF",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"name": "6130",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"name": "6123",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"name": "6122",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"name": "oval:org.mitre.oval:def:9627",
"refsource": "OVAL",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
},
{
"name": "oval:org.mitre.oval:def:5917",
"refsource": "OVAL",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
},
{
"name": "oval:org.mitre.oval:def:5761",
"refsource": "OVAL",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
},
{
"name": "oval:org.mitre.oval:def:5725",
"refsource": "OVAL",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
},
{
"name": "oval:org.mitre.oval:def:12117",
"refsource": "OVAL",
"tags": [
"Tool Signature"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource": "BUGTRAQ",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"name": "20080808 New paper: An Illustrated Guide to the Kaminsky DNS Vulnerability",
"refsource": "BUGTRAQ",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"name": "MS08-037",
"refsource": "MS",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 4.0
}
},
"lastModifiedDate": "2020-03-24T18:19Z",
"publishedDate": "2008-07-08T23:41Z"
}
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.