Action not permitted
Modal body text goes here.
cve-2011-2192
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2011:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "name": "45181", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45181" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "45144", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45144" }, { "name": "USN-1158-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1158-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "name": "45067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45067" }, { "name": "FEDORA-2011-8640", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "name": "1025713", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025713" }, { "name": "RHSA-2011:0918", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "GLSA-201203-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "48256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48256" }, { "name": "DSA-2271", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2271" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "name": "45088", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45088" }, { "name": "FEDORA-2011-8586", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "name": "45047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45047" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "MDVSA-2011:116", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "name": "45181", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45181" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "45144", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45144" }, { "name": "USN-1158-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1158-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "name": "45067", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45067" }, { "name": "FEDORA-2011-8640", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "name": "1025713", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025713" }, { "name": "RHSA-2011:0918", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "GLSA-201203-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "48256", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48256" }, { "name": "DSA-2271", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2271" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "name": "45088", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45088" }, { "name": "FEDORA-2011-8586", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "name": "45047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45047" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2192", "datePublished": "2011-07-07T21:00:00", "dateReserved": "2011-05-31T00:00:00", "dateUpdated": "2024-08-06T22:53:17.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-2192\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-07-07T21:55:02.320\",\"lastModified\":\"2020-05-27T20:42:18.200\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n Curl_input_negotiate en http_negotiate.c en libcurl v7.10.6 \\r\\na v7.21.6, tal y como se utiliza en curl y otras aplicaciones, siempre lleva a cabo \\r\\ndelegaci\u00f3n de credenciales durante la autenticaci\u00f3n GSSAPI, lo que permite a \\r\\nhacerse pasar por clientes legitimos a servidores remotos a trav\u00e9s de peticiones GSSAPI.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-255\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.10.6\",\"versionEndIncluding\":\"7.21.6\",\"matchCriteriaId\":\"B0E81972-6194-4EE4-89D4-9CEDF84BEAF3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.7.3\",\"matchCriteriaId\":\"22675032-282C-4F77-B590-46F3FAD615C3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE52846-24EC-4068-B788-EC7F915FFF11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9396E005-22D8-4342-9323-C7DEA379191D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5D37DF0F-F863-45AC-853A-3E04F9FEC7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF49D26F-142E-468B-87C1-BABEA445255C\"}]}]}],\"references\":[{\"url\":\"http://curl.haxx.se/curl-gssapi-delegation.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://curl.haxx.se/docs/adv_20110623.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45047\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45067\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45088\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45144\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/45181\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/48256\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201203-02.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5130\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2271\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:116\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0918.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1025713\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1158-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=711454\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}" } }
ghsa-2jvc-33pv-cq2m
Vulnerability from github
The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.
{ "affected": [], "aliases": [ "CVE-2011-2192" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-07-07T21:55:00Z", "severity": "MODERATE" }, "details": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.", "id": "GHSA-2jvc-33pv-cq2m", "modified": "2022-05-13T01:26:15Z", "published": "2022-05-13T01:26:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2192" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "type": "WEB", "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "type": "WEB", "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/45047" }, { "type": "WEB", "url": "http://secunia.com/advisories/45067" }, { "type": "WEB", "url": "http://secunia.com/advisories/45088" }, { "type": "WEB", "url": "http://secunia.com/advisories/45144" }, { "type": "WEB", "url": "http://secunia.com/advisories/45181" }, { "type": "WEB", "url": "http://secunia.com/advisories/48256" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5130" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2271" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1025713" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1158-1" } ], "schema_version": "1.4.0", "severity": [] }
var-201107-0125
Vulnerability from variot
The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests. cURL/libcURL is prone to a vulnerability that may allow attackers to spoof clients' security credentials. This issue affects cURL/libcURL versions 7.10.6 through 7.21.6. This is obviously a very sensitive operation, which should only be done when the user explicitly so directs.
For the oldstable distribution (lenny), this problem has been fixed in version 7.18.2-8lenny5.
For the stable distribution (squeeze), this problem has been fixed in version 7.21.0-2.
For the testing distribution (wheezy), this problem has been fixed in version 7.21.6-2.
For the unstable distribution (sid), this problem has been fixed in version 7.21.6-2. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . Summary:
Updated curl packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
- Description:
cURL provides the libcurl library and a command line tool for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. (CVE-2011-2192)
Users of curl should upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libcurl must be restarted for the update to take effect. Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
711454 - CVE-2011-2192 curl: Improper delegation of client credentials during GSS negotiation
- Package List:
Red Hat Enterprise Linux AS version 4:
Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm
i386: curl-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-devel-7.12.1-17.el4.i386.rpm
ia64: curl-7.12.1-17.el4.i386.rpm curl-7.12.1-17.el4.ia64.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.ia64.rpm curl-devel-7.12.1-17.el4.ia64.rpm
ppc: curl-7.12.1-17.el4.ppc.rpm curl-7.12.1-17.el4.ppc64.rpm curl-debuginfo-7.12.1-17.el4.ppc.rpm curl-debuginfo-7.12.1-17.el4.ppc64.rpm curl-devel-7.12.1-17.el4.ppc.rpm
s390: curl-7.12.1-17.el4.s390.rpm curl-debuginfo-7.12.1-17.el4.s390.rpm curl-devel-7.12.1-17.el4.s390.rpm
s390x: curl-7.12.1-17.el4.s390.rpm curl-7.12.1-17.el4.s390x.rpm curl-debuginfo-7.12.1-17.el4.s390.rpm curl-debuginfo-7.12.1-17.el4.s390x.rpm curl-devel-7.12.1-17.el4.s390x.rpm
x86_64: curl-7.12.1-17.el4.i386.rpm curl-7.12.1-17.el4.x86_64.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.x86_64.rpm curl-devel-7.12.1-17.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm
i386: curl-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-devel-7.12.1-17.el4.i386.rpm
x86_64: curl-7.12.1-17.el4.i386.rpm curl-7.12.1-17.el4.x86_64.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.x86_64.rpm curl-devel-7.12.1-17.el4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm
i386: curl-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-devel-7.12.1-17.el4.i386.rpm
ia64: curl-7.12.1-17.el4.i386.rpm curl-7.12.1-17.el4.ia64.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.ia64.rpm curl-devel-7.12.1-17.el4.ia64.rpm
x86_64: curl-7.12.1-17.el4.i386.rpm curl-7.12.1-17.el4.x86_64.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.x86_64.rpm curl-devel-7.12.1-17.el4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm
i386: curl-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-devel-7.12.1-17.el4.i386.rpm
ia64: curl-7.12.1-17.el4.i386.rpm curl-7.12.1-17.el4.ia64.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.ia64.rpm curl-devel-7.12.1-17.el4.ia64.rpm
x86_64: curl-7.12.1-17.el4.i386.rpm curl-7.12.1-17.el4.x86_64.rpm curl-debuginfo-7.12.1-17.el4.i386.rpm curl-debuginfo-7.12.1-17.el4.x86_64.rpm curl-devel-7.12.1-17.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm
i386: curl-7.15.5-9.el5_6.3.i386.rpm curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm
x86_64: curl-7.15.5-9.el5_6.3.i386.rpm curl-7.15.5-9.el5_6.3.x86_64.rpm curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm curl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm
i386: curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm curl-devel-7.15.5-9.el5_6.3.i386.rpm
x86_64: curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm curl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm curl-devel-7.15.5-9.el5_6.3.i386.rpm curl-devel-7.15.5-9.el5_6.3.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm
i386: curl-7.15.5-9.el5_6.3.i386.rpm curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm curl-devel-7.15.5-9.el5_6.3.i386.rpm
ia64: curl-7.15.5-9.el5_6.3.ia64.rpm curl-debuginfo-7.15.5-9.el5_6.3.ia64.rpm curl-devel-7.15.5-9.el5_6.3.ia64.rpm
ppc: curl-7.15.5-9.el5_6.3.ppc.rpm curl-7.15.5-9.el5_6.3.ppc64.rpm curl-debuginfo-7.15.5-9.el5_6.3.ppc.rpm curl-debuginfo-7.15.5-9.el5_6.3.ppc64.rpm curl-devel-7.15.5-9.el5_6.3.ppc.rpm curl-devel-7.15.5-9.el5_6.3.ppc64.rpm
s390x: curl-7.15.5-9.el5_6.3.s390.rpm curl-7.15.5-9.el5_6.3.s390x.rpm curl-debuginfo-7.15.5-9.el5_6.3.s390.rpm curl-debuginfo-7.15.5-9.el5_6.3.s390x.rpm curl-devel-7.15.5-9.el5_6.3.s390.rpm curl-devel-7.15.5-9.el5_6.3.s390x.rpm
x86_64: curl-7.15.5-9.el5_6.3.i386.rpm curl-7.15.5-9.el5_6.3.x86_64.rpm curl-debuginfo-7.15.5-9.el5_6.3.i386.rpm curl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm curl-devel-7.15.5-9.el5_6.3.i386.rpm curl-devel-7.15.5-9.el5_6.3.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm
i386: curl-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm libcurl-7.19.7-26.el6_1.1.i686.rpm
x86_64: curl-7.19.7-26.el6_1.1.x86_64.rpm curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm libcurl-7.19.7-26.el6_1.1.i686.rpm libcurl-7.19.7-26.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm
i386: curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm libcurl-devel-7.19.7-26.el6_1.1.i686.rpm
x86_64: curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm libcurl-devel-7.19.7-26.el6_1.1.i686.rpm libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm
x86_64: curl-7.19.7-26.el6_1.1.x86_64.rpm curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm libcurl-7.19.7-26.el6_1.1.i686.rpm libcurl-7.19.7-26.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm
x86_64: curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm libcurl-devel-7.19.7-26.el6_1.1.i686.rpm libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm
i386: curl-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm libcurl-7.19.7-26.el6_1.1.i686.rpm libcurl-devel-7.19.7-26.el6_1.1.i686.rpm
ppc64: curl-7.19.7-26.el6_1.1.ppc64.rpm curl-debuginfo-7.19.7-26.el6_1.1.ppc.rpm curl-debuginfo-7.19.7-26.el6_1.1.ppc64.rpm libcurl-7.19.7-26.el6_1.1.ppc.rpm libcurl-7.19.7-26.el6_1.1.ppc64.rpm libcurl-devel-7.19.7-26.el6_1.1.ppc.rpm libcurl-devel-7.19.7-26.el6_1.1.ppc64.rpm
s390x: curl-7.19.7-26.el6_1.1.s390x.rpm curl-debuginfo-7.19.7-26.el6_1.1.s390.rpm curl-debuginfo-7.19.7-26.el6_1.1.s390x.rpm libcurl-7.19.7-26.el6_1.1.s390.rpm libcurl-7.19.7-26.el6_1.1.s390x.rpm libcurl-devel-7.19.7-26.el6_1.1.s390.rpm libcurl-devel-7.19.7-26.el6_1.1.s390x.rpm
x86_64: curl-7.19.7-26.el6_1.1.x86_64.rpm curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm libcurl-7.19.7-26.el6_1.1.i686.rpm libcurl-7.19.7-26.el6_1.1.x86_64.rpm libcurl-devel-7.19.7-26.el6_1.1.i686.rpm libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm
i386: curl-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm libcurl-7.19.7-26.el6_1.1.i686.rpm libcurl-devel-7.19.7-26.el6_1.1.i686.rpm
x86_64: curl-7.19.7-26.el6_1.1.x86_64.rpm curl-debuginfo-7.19.7-26.el6_1.1.i686.rpm curl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm libcurl-7.19.7-26.el6_1.1.i686.rpm libcurl-7.19.7-26.el6_1.1.x86_64.rpm libcurl-devel-7.19.7-26.el6_1.1.i686.rpm libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-2192.html https://access.redhat.com/security/updates/classification/#moderate http://curl.haxx.se/docs/adv_20110623.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-02-01-1 OS X Lion v10.7.3 and Security Update 2012-001
OS X Lion v10.7.3 and Security Update 2012-001 is now available and addresses the following:
Address Book Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: An attacker in a privileged network position may intercept CardDAV data Description: Address Book supports Secure Sockets Layer (SSL) for accessing CardDAV. A downgrade issue caused Address Book to attempt an unencrypted connection if an encrypted connection failed. An attacker in a privileged network position could abuse this behavior to intercept CardDAV data. This issue is addressed by not downgrading to an unencrypted connection without user approval. CVE-ID CVE-2011-3444 : Bernard Desruisseaux of Oracle Corporation
Apache Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Multiple vulnerabilities in Apache Description: Apache is updated to version 2.2.21 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/ CVE-ID CVE-2011-3348
Apache Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. Apache disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by providing a configuration parameter to control the countermeasure and enabling it by default. CVE-ID CVE-2011-3389
CFNetwork Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in CFNetwork's handling of malformed URLs. When accessing a maliciously crafted URL, CFNetwork could send the request to an incorrect origin server. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3246 : Erling Ellingsen of Facebook
CFNetwork Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in CFNetwork's handling of malformed URLs. When accessing a maliciously crafted URL, CFNetwork could send unexpected request headers. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3447 : Erling Ellingsen of Facebook
ColorSync Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Viewing a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of images with an embedded ColorSync profile, which may lead to a heap buffer overflow. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-0200 : binaryproof working with TippingPoint's Zero Day Initiative
CoreAudio Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Playing maliciously crafted audio content may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of AAC encoded audio streams. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-3252 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
CoreMedia Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in CoreMedia's handling of H.264 encoded movie files. CVE-ID CVE-2011-3448 : Scott Stender of iSEC Partners
CoreText Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to an unexpected application termination or arbitrary code execution Description: A use after free issue existed in the handling of font files. CVE-ID CVE-2011-3449 : Will Dormann of the CERT/CC
CoreUI Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Visiting a malicious website may lead to an unexpected application termination or arbitrary code execution Description: An unbounded stack allocation issue existed in the handling of long URLs. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3450 : Ben Syverson
curl Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: A remote server may be able to impersonate clients via GSSAPI requests Description: When doing GSSAPI authentication, libcurl unconditionally performs credential delegation. This issue is addressed by disabling GSSAPI credential delegation. CVE-ID CVE-2011-2192
Data Security Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: Two certificate authorities in the list of trusted root certificates have independently issued intermediate certificates to DigiCert Malaysia. DigiCert Malaysia has issued certificates with weak keys that it is unable to revoke. An attacker with a privileged network position could intercept user credentials or other sensitive information intended for a site with a certificate issued by DigiCert Malaysia. This issue is addressed by configuring default system trust settings so that DigiCert Malaysia's certificates are not trusted. We would like to acknowledge Bruce Morton of Entrust, Inc.
dovecot Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. Dovecot disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by enabling the countermeasure. CVE-ID CVE-2011-3389 : Apple
filecmds Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Decompressing a maliciously crafted compressed file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the 'uncompress' command line tool. CVE-ID CVE-2011-2895
ImageIO Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in ImageIO's handling of CCITT Group 4 encoded TIFF files. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies
ImageIO Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in libtiff's handling of ThunderScan encoded TIFF images. This issue is address by updating libtiff to version 3.9.5. CVE-ID CVE-2011-1167
ImageIO Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Multiple vulnerabilities in libpng 1.5.4 Description: libpng is updated to version 1.5.5 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the libpng website at http://www.libpng.org/pub/png/libpng.html CVE-ID CVE-2011-3328
Internet Sharing Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: A Wi-Fi network created by Internet Sharing may lose security settings after a system update Description: After updating to a version of OS X Lion prior to 10.7.3, the Wi-Fi configuration used by Internet Sharing may revert to factory defaults, which disables the WEP password. This issue only affects systems with Internet Sharing enabled and sharing the connection to Wi-Fi. This issue is addressed by preserving the Wi-Fi configuration during a system update. CVE-ID CVE-2011-3452 : an anonymous researcher
Libinfo Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in Libinfo's handling of hostname lookup requests. Libinfo could return incorrect results for a maliciously crafted hostname. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3441 : Erling Ellingsen of Facebook
libresolv Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Applications that use OS X's libresolv library may be vulnerable to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the parsing of DNS resource records, which may lead to heap memory corruption. CVE-ID CVE-2011-3453 : Ilja van Sprundel of IOActive
libsecurity Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Some EV certificates may be trusted even if the corresponding root has been marked as untrusted Description: The certificate code trusted a root certificate to sign EV certificates if it was on the list of known EV issuers, even if the user had marked it as 'Never Trust' in Keychain. The root would not be trusted to sign non-EV certificates. CVE-ID CVE-2011-3422 : Alastair Houghton
OpenGL Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Applications that use OS X's OpenGL implementation may be vulnerable to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in the handling of GLSL compilation. CVE-ID CVE-2011-3457 : Chris Evans of the Google Chrome Security Team, and Marc Schoenefeld of the Red Hat Security Response Team
PHP Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Multiple vulnerabilities in PHP 5.3.6 Description: PHP is updated to version 5.3.8 to address several vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP web site at http://www.php.net CVE-ID CVE-2011-1148 CVE-2011-1657 CVE-2011-1938 CVE-2011-2202 CVE-2011-2483 CVE-2011-3182 CVE-2011-3189 CVE-2011-3267 CVE-2011-3268
PHP Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in FreeType's handling of Type 1 fonts. Further information is available via the FreeType site at http://www.freetype.org/ CVE-ID CVE-2011-3256 : Apple
PHP Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Multiple vulnerabilities in libpng 1.5.4 Description: libpng is updated to version 1.5.5 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the libpng website at http://www.libpng.org/pub/png/libpng.html CVE-ID CVE-2011-3328
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Opening a maliciously crafted MP4 encoded file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access issue existed in the handling of MP4 encoded files. CVE-ID CVE-2011-3458 : Luigi Auriemma and pa_kt both working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in the handling of font tables embedded in QuickTime movie files. CVE-ID CVE-2011-3248 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An off by one buffer overflow existed in the handling of rdrf atoms in QuickTime movie files. CVE-ID CVE-2011-3459 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted JPEG2000 image file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 files. CVE-ID CVE-2011-3250 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Processing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of PNG files. CVE-ID CVE-2011-3460 : Luigi Auriemma working with TippingPoint's Zero Day Initiative
QuickTime Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of FLC encoded movie files CVE-ID CVE-2011-3249 : Matt 'j00ru' Jurczyk working with TippingPoint's Zero Day Initiative
SquirrelMail Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Multiple vulnerabilities in SquirrelMail Description: SquirrelMail is updated to version 1.4.22 to address several vulnerabilities, the most serious of which is a cross-site scripting issue. This issue does not affect OS X Lion systems. Further information is available via the SquirrelMail web site at http://www.SquirrelMail.org/ CVE-ID CVE-2010-1637 CVE-2010-2813 CVE-2010-4554 CVE-2010-4555 CVE-2011-2023
Subversion Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Accessing a Subversion repository may lead to the disclosure of sensitive information Description: Subversion is updated to version 1.6.17 to address multiple vulnerabilities, the most serious of which may lead to the disclosure of sensitive information. Further information is available via the Subversion web site at http://subversion.tigris.org/ CVE-ID CVE-2011-1752 CVE-2011-1783 CVE-2011-1921
Time Machine Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: A remote attacker may access new backups created by the user's system Description: The user may designate a remote AFP volume or Time Capsule to be used for Time Machine backups. Time Machine did not verify that the same device was being used for subsequent backup operations. An attacker who is able to spoof the remote volume could gain access to new backups created by the user's system. This issue is addressed by verifying the unique identifier associated with a disk for backup operations. CVE-ID CVE-2011-3462 : Michael Roitzsch of the Technische Universitat Dresden
Tomcat Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Multiple vulnerabilities in Tomcat 6.0.32 Description: Tomcat is updated to version 6.0.33 to address multiple vulnerabilities, the most serious of which may lead to the disclosure of sensitive information. Tomcat is only provided on Mac OS X Server systems. This issue does not affect OS X Lion systems. Further information is available via the Tomcat site at http://tomcat.apache.org/ CVE-ID CVE-2011-2204
WebDAV Sharing Available for: OS X Lion Server v10.7 to v10.7.2 Impact: Local users may obtain system privileges Description: An issue existed in WebDAV Sharing's handling of user authentication. A user with a valid account on the server or one of its bound directories could cause the execution of arbitrary code with system privileges. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3463 : Gordon Davisson of Crywolf
Webmail Available for: OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted e-mail message may lead to the disclosure of message content Description: A cross-site scripting vulnerability existed in the handling of mail messages. This issue is addressed by updating Roundcube Webmail to version 0.6. This issue does not affect systems prior to OS X Lion. Further information is available via the Roundcube site at http://trac.roundcube.net/ CVE-ID CVE-2011-2937
X11 Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2 Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in FreeType's handling of Type 1 fonts. Further information is available via the FreeType site at http://www.freetype.org/ CVE-ID CVE-2011-3256 : Apple
OS X Lion v10.7.3 and Security Update 2012-001 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2021-001 or OS X v10.7.3.
For OS X Lion v10.7.2 The download file is named: MacOSXUpd10.7.3.dmg Its SHA-1 digest is: 7102fe8f9f47286c45dfa35f6e84e7f730493a7c
For OS X Lion v10.7 and v10.7.1 The download file is named: MacOSXUpdCombo10.7.3.dmg Its SHA-1 digest is: 07dfce300f6801eb63d9ac13e0bec84e1862a16c
For OS X Lion Server v10.7.2 The download file is named: MacOSXServerUpd10.7.3.dmg Its SHA-1 digest is: 55a9571635d4ec088c142d68132d0d69fcb8867d
For OS X Lion Server v10.7 and v10.7.1 The download file is named: MacOSXServerUpdCombo10.7.3.dmg Its SHA-1 digest is: 2c87824f09734499ea166ea0617a3ac21ecf832b
For Mac OS X v10.6.8 The download file is named: SecUpd2012-001Snow.dmg Its SHA-1 digest is: 40875ee8cb609bbaefc8f421a9c34cc353db42b8
For Mac OS X Server v10.6.8 The download file is named: SecUpdSrvr2012-001.dmg Its SHA-1 digest is: 53b3ca5548001a9920aeabed4a034c6e4657fe20
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin)
iQEcBAEBAgAGBQJPKYxNAAoJEGnF2JsdZQeeLiIIAMLhH2ipDFrhCsw/n4VDeF1V P6jSkGXC9tBBVMvw1Xq4c2ok4SI34bDfMlURAVR+dde/h6nIZR24aLQVoDLjJuIp RrO2dm1nQeozLJSx2NbxhVh54BucJdKp4xS1GkDNxkqcdh04RE9hRURXdKagnfGy 9P8QQPOQmKAiWos/LYhCPDInMfrpVNvEVwP8MCDP15g6hylN4De/Oyt7ZshPshSf MnAFObfBTGX5KioVqTyfdlBkKUfdXHJux61QEFHn8eadX6+/6IuKbUvK9B0icc8E pvbjOxQatFRps0KNWeIsKQc5i6iQoJhocAiIy6Y6LCuZQuSXCImY2RWXkVYzbWo= =c1eU -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03280632 Version: 1
HPSBMU02764 SSRT100827 rev.1 - HP System Management Homepage (SMH) Running on Linux and Windows, Remote Cross Site Request Forgery (CSRF), Denial of Service (DoS), Execution of Arbitrary Code, Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-04-16 Last Updated: 2012-04-16
Potential Security Impact: Remote cross site request forgery (CSRF), Denial of Service (DoS), execution of arbitrary code, other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely and locally resulting in cross site request forgery (CSRF), Denial of Service (DoS), execution of arbitrary code, and other vulnerabilities. HP System Management Homepage (SMH) before v7.0 running on Linux and Windows.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2009-0037 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2010-0734 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2010-1452 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2010-1623 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2010-2068 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2010-2791 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2010-3436 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2010-4409 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2010-4645 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-0014 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-0195 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-1148 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-1153 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-1464 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-1467 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-1468 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-1470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-1471 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-1928 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-1938 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-1945 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6 CVE-2011-2192 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2011-2202 (AV:N/AC:L/Au:N/C:N/I:P/A:P) 6.4 CVE-2011-2483 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2011-3182 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-3189 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2011-3267 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-3268 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3207 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2011-3210 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-3348 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-3368 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2011-3639 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2011-3846 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2012-0135 (AV:N/AC:M/Au:S/C:N/I:N/A:P) 3.5 CVE-2012-1993 (AV:L/AC:L/Au:S/C:P/I:P/A:N) 3.2 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Sow Ching Shiong coordinating with Secunia for reporting CVE-2011-3846 to security-alert@hp.com.
RESOLUTION
HP has provided HP System Management Homepage v7.0 or subsequent to resolve the vulnerabilities.
SMH v7.0 is available here: http://h18000.www1.hp.com/products/servers/management/agents/index.html
HISTORY Version:1 (rev.1) 16 April 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
Packages for 2009.0 are provided as of the Extended Maintenance Program. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2012-0001 Synopsis: VMware ESXi and ESX updates to third party library and ESX Service Console Issue date: 2012-01-30 Updated on: 2012-01-30 (initial advisory)
CVE numbers: --- COS Kernel --- CVE-2011-0726, CVE-2011-1078, CVE-2011-1079, CVE-2011-1080, CVE-2011-1093, CVE-2011-1163, CVE-2011-1166, CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1494, CVE-2011-1495, CVE-2011-1577, CVE-2011-1763, CVE-2010-4649, CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182, CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745, CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022, CVE-2011-2213, CVE-2011-2492, CVE-2011-1780, CVE-2011-2525, CVE-2011-2689, CVE-2011-2482, CVE-2011-2491, CVE-2011-2495, CVE-2011-2517, CVE-2011-2519, CVE-2011-2901 --- COS cURL --- CVE-2011-2192 --- COS rpm --- CVE-2010-2059, CVE-2011-3378 --- COS samba --- CVE-2010-0547, CVE-2010-0787, CVE-2011-1678, CVE-2011-2522, CVE-2011-2694 --- COS python --- CVE-2009-3720, CVE-2010-3493, CVE-2011-1015, CVE-2011-1521 --- python library --- CVE-2009-3560, CVE-2009-3720, CVE-2010-1634, CVE-2010-2089, CVE-2011-1521
- Summary
VMware ESXi and ESX updates to third party library and ESX Service Console address several security issues.
- Relevant releases
ESXi 4.1 without patch ESXi410-201201401-SG
ESX 4.1 without patches ESX410-201201401-SG, ESX410-201201402-SG, ESX410-201201404-SG, ESX410-201201405-SG, ESX410-201201406-SG, ESX410-201201407-SG
- Problem Description
a. ESX third party update for Service Console kernel
The ESX Service Console Operating System (COS) kernel is updated to
kernel-2.6.18-274.3.1.el5 to fix multiple security issues in the
COS kernel.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2011-0726, CVE-2011-1078, CVE-2011-1079,
CVE-2011-1080, CVE-2011-1093, CVE-2011-1163, CVE-2011-1166,
CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1494,
CVE-2011-1495, CVE-2011-1577, CVE-2011-1763, CVE-2010-4649,
CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182,
CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745,
CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022,
CVE-2011-2213, CVE-2011-2492, CVE-2011-1780, CVE-2011-2525,
CVE-2011-2689, CVE-2011-2482, CVE-2011-2491, CVE-2011-2495,
CVE-2011-2517, CVE-2011-2519, CVE-2011-2901 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201401-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
- hosted products are VMware Workstation, Player, ACE, Fusion.
b. ESX third party update for Service Console cURL RPM
The ESX Service Console (COS) curl RPM is updated to cURL-7.15.5.9
resolving a security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2011-2192 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201402-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
c. ESX third party update for Service Console nspr and nss RPMs
The ESX Service Console (COS) nspr and nss RPMs are updated to
nspr-4.8.8-1.el5_7 and nss-3.12.10-4.el5_7 respectively resolving
a security issues.
A Certificate Authority (CA) issued fraudulent SSL certificates and
Netscape Portable Runtime (NSPR) and Network Security Services (NSS)
contain the built-in tokens of this fraudulent Certificate
Authority. This update renders all SSL certificates signed by the
fraudulent CA as untrusted for all uses.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201404-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
d. ESX third party update for Service Console rpm RPMs
The ESX Service Console Operating System (COS) rpm packages are
updated to popt-1.10.2.3-22.el5_7.2, rpm-4.4.2.3-22.el5_7.2,
rpm-libs-4.4.2.3-22.el5_7.2 and rpm-python-4.4.2.3-22.el5_7.2
which fixes multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2010-2059 and CVE-2011-3378 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201406-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
e. ESX third party update for Service Console samba RPMs
The ESX Service Console Operating System (COS) samba packages are
updated to samba-client-3.0.33-3.29.el5_7.4,
samba-common-3.0.33-3.29.el5_7.4 and
libsmbclient-3.0.33-3.29.el5_7.4 which fixes multiple security
issues in the Samba client.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2010-0547, CVE-2010-0787, CVE-2011-1678,
CVE-2011-2522 and CVE-2011-2694 to these issues.
Note that ESX does not include the Samba Web Administration Tool
(SWAT) and therefore ESX COS is not affected by CVE-2011-2522 and
CVE-2011-2694.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201407-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
f. ESX third party update for Service Console python package
The ESX Service Console (COS) python package is updated to
2.4.3-44 which fixes multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2009-3720, CVE-2010-3493, CVE-2011-1015 and
CVE-2011-1521 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201405-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
g. ESXi update to third party component python
The python third party library is updated to python 2.5.6 which
fixes multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634,
CVE-2010-2089, and CVE-2011-1521 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi 5.0 ESXi patch pending
ESXi 4.1 ESXi ESXi410-201201401-SG
ESXi 4.0 ESXi patch pending
ESXi 3.5 ESXi patch pending
ESX 4.1 ESX not affected
ESX 4.0 ESX not affected
ESX 3.5 ESX not affected
* hosted products are VMware Workstation, Player, ACE, Fusion.
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware ESXi 4.1
ESXi410-201201401
http://downloads.vmware.com/go/selfsupport-download
md5sum: BDF86F10A973346E26C9C2CD4C424E88
sha1sum: CC0B92869A9AAE4F5E0E5B81BEE109BCD7DA780F
http://kb.vmware.com/kb/2009143
ESXi410-201201401 contains ESXi410-201201401-SG
VMware ESX 4.1
ESX410-201201001
http://downloads.vmware.com/go/selfsupport-download
md5sum: 16DF9ACD3E74BCABC2494BC23AD0927F
sha1sum: 1066AE1436E1A75BA3D541AB65296CFB9AB7A5CC
http://kb.vmware.com/kb/2009142
ESX410-201201001 contains ESX410-201201401-SG, ESX410-201201402-SG, ESX410-201201404-SG, ESX410-201201405-SG, ESX410-201201406-SG and ESX410-201201407-SG
- References
CVE numbers
--- COS Kernel --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1078 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1079 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1080 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1093 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1170 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1171 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1172 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1494 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1495 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1763 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0695 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1573 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1576 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1593 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1745 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1746 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1936 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2022 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2213 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2492 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2525 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2689 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2482 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2495 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2901 --- COS cURL --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192 --- COS rpm --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2059 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378 --- COS samba --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694 --- COS python --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521 --- python library --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1634 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2089 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521
- Change log
2012-01-30 VMSA-2012-0001 Initial security advisory in conjunction with the release of patches for ESX 4.1 and ESXi 4.1 on 2012-01-30.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2012 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8
wj8DBQFPJ5DIDEcm8Vbi9kMRAnzCAKCmaAoDp49d61Mr1emzh/U0N8vbgACdFZk8 f2pLxi537s+ew4dvnYNWlJ8= =OAh4 -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201203-02
http://security.gentoo.org/
Severity: Normal Title: cURL: Multiple vulnerabilities Date: March 06, 2012 Bugs: #308645, #373235, #400799 ID: 201203-02
Synopsis
Multiple vulnerabilities have been found in cURL, the worst of which might allow remote execution of arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/curl < 7.24.0 >= 7.24.0
Description
Multiple vulnerabilities have been found in cURL:
- When zlib is enabled, the amount of data sent to an application for automatic decompression is not restricted (CVE-2010-0734).
- When SSL is enabled, cURL improperly disables the OpenSSL workaround to mitigate an information disclosure vulnerability in the SSL and TLS protocols (CVE-2011-3389).
- libcurl does not properly verify file paths for escape control characters in IMAP, POP3 or SMTP URLs (CVE-2012-0036).
Impact
A remote attacker could entice a user or automated process to open a specially crafted file or URL using cURL, possibly resulting in the remote execution of arbitrary code, a Denial of Service condition, disclosure of sensitive information, or unwanted actions performed via the IMAP, POP3 or SMTP protocols.
Workaround
There is no known workaround at this time.
Resolution
All cURL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/curl-7.24.0"
References
[ 1 ] CVE-2010-0734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0734 [ 2 ] CVE-2011-2192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2192 [ 3 ] CVE-2011-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389 [ 4 ] CVE-2012-0036 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0036
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201203-02.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201107-0125", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "5.0" }, { "model": "libcurl", "scope": "gte", "trust": 1.0, "vendor": "haxx", "version": "7.10.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.10" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.7.3" }, { "model": "libcurl", "scope": "lte", "trust": 1.0, "vendor": "haxx", "version": "7.21.6" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "11.04" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "14" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "8.04" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "15" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.04" }, { "model": "libcurl", "scope": "eq", "trust": 0.8, "vendor": "haxx", "version": "7.10.6 to 7.21.6" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "3.5" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.0" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.6.z (server)" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux long life", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 5.6 server)" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6.1.z" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.21.4" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.21.6" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.21.5" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.21.1" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.20.1" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.20.0" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.21.2" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.19.7" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.21.3" }, { "model": "libcurl", "scope": "eq", "trust": 0.6, "vendor": "curl", "version": "7.19.6" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.16.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1.0-103" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.0.95" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.1.73" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.0-95" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.14.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "system management homepage", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.13" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.11.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "stenberg curl", "scope": "ne", "trust": 0.3, "vendor": "daniel", "version": "7.21.7" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.21.6" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.0-68" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "hat enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.2-77" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "voice portal", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.8" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "hat enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.18" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.12.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.12.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19.3" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.2.77" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.18.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "message networking", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.1-73" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.2.1" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2.27" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.12.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19.5" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.10.7" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.14" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19.6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.20" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.96" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.10.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.19.4" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.12" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1.0.103" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.16.3" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.11" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "system management homepage b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.2.77" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.64" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.15.5" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.17" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.1" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.11.1" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.13.1" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "messaging storage server sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "hat enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "hat enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.10.8" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.13.2" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.20.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2.0-12" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "stenberg curl", "scope": "eq", "trust": 0.3, "vendor": "daniel", "version": "7.20.2" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.0.68" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1.0.102" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" } ], "sources": [ { "db": "BID", "id": "48434" }, { "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "db": "CNNVD", "id": "CNNVD-201106-322" }, { "db": "NVD", "id": "CVE-2011-2192" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.21.6", "versionStartIncluding": "7.10.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.7.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2011-2192" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\u0026amp;lt;br\u0026amp;gt;Richard Silverman", "sources": [ { "db": "BID", "id": "48434" } ], "trust": 0.3 }, "cve": "CVE-2011-2192", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2011-2192", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-50137", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2011-2192", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201106-322", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-50137", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-50137" }, { "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "db": "CNNVD", "id": "CNNVD-201106-322" }, { "db": "NVD", "id": "CVE-2011-2192" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests. cURL/libcURL is prone to a vulnerability that may allow attackers to spoof clients\u0027 security credentials. \nThis issue affects cURL/libcURL versions 7.10.6 through 7.21.6. \nThis is obviously a very sensitive operation, which should only be done when\nthe user explicitly so directs. \n\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 7.18.2-8lenny5. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 7.21.0-2. \n\nFor the testing distribution (wheezy), this problem has been fixed in\nversion 7.21.6-2. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 7.21.6-2. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. Summary:\n\nUpdated curl packages that fix one security issue are now available for Red\nHat Enterprise Linux 4, 5, and 6. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop version 4 - i386, x86_64\nRed Hat Enterprise Linux ES version 4 - i386, ia64, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux WS version 4 - i386, ia64, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\n\n3. Description:\n\ncURL provides the libcurl library and a command line tool for downloading\nfiles from servers using various protocols, including HTTP, FTP, and LDAP. (CVE-2011-2192)\n\nUsers of curl should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. All running applications using\nlibcurl must be restarted for the update to take effect. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n711454 - CVE-2011-2192 curl: Improper delegation of client credentials during GSS negotiation\n\n6. Package List:\n\nRed Hat Enterprise Linux AS version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm\n\ni386:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-devel-7.12.1-17.el4.i386.rpm\n\nia64:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-7.12.1-17.el4.ia64.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.ia64.rpm\ncurl-devel-7.12.1-17.el4.ia64.rpm\n\nppc:\ncurl-7.12.1-17.el4.ppc.rpm\ncurl-7.12.1-17.el4.ppc64.rpm\ncurl-debuginfo-7.12.1-17.el4.ppc.rpm\ncurl-debuginfo-7.12.1-17.el4.ppc64.rpm\ncurl-devel-7.12.1-17.el4.ppc.rpm\n\ns390:\ncurl-7.12.1-17.el4.s390.rpm\ncurl-debuginfo-7.12.1-17.el4.s390.rpm\ncurl-devel-7.12.1-17.el4.s390.rpm\n\ns390x:\ncurl-7.12.1-17.el4.s390.rpm\ncurl-7.12.1-17.el4.s390x.rpm\ncurl-debuginfo-7.12.1-17.el4.s390.rpm\ncurl-debuginfo-7.12.1-17.el4.s390x.rpm\ncurl-devel-7.12.1-17.el4.s390x.rpm\n\nx86_64:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-7.12.1-17.el4.x86_64.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.x86_64.rpm\ncurl-devel-7.12.1-17.el4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm\n\ni386:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-devel-7.12.1-17.el4.i386.rpm\n\nx86_64:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-7.12.1-17.el4.x86_64.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.x86_64.rpm\ncurl-devel-7.12.1-17.el4.x86_64.rpm\n\nRed Hat Enterprise Linux ES version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm\n\ni386:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-devel-7.12.1-17.el4.i386.rpm\n\nia64:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-7.12.1-17.el4.ia64.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.ia64.rpm\ncurl-devel-7.12.1-17.el4.ia64.rpm\n\nx86_64:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-7.12.1-17.el4.x86_64.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.x86_64.rpm\ncurl-devel-7.12.1-17.el4.x86_64.rpm\n\nRed Hat Enterprise Linux WS version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/curl-7.12.1-17.el4.src.rpm\n\ni386:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-devel-7.12.1-17.el4.i386.rpm\n\nia64:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-7.12.1-17.el4.ia64.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.ia64.rpm\ncurl-devel-7.12.1-17.el4.ia64.rpm\n\nx86_64:\ncurl-7.12.1-17.el4.i386.rpm\ncurl-7.12.1-17.el4.x86_64.rpm\ncurl-debuginfo-7.12.1-17.el4.i386.rpm\ncurl-debuginfo-7.12.1-17.el4.x86_64.rpm\ncurl-devel-7.12.1-17.el4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm\n\ni386:\ncurl-7.15.5-9.el5_6.3.i386.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.i386.rpm\n\nx86_64:\ncurl-7.15.5-9.el5_6.3.i386.rpm\ncurl-7.15.5-9.el5_6.3.x86_64.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.i386.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm\n\ni386:\ncurl-debuginfo-7.15.5-9.el5_6.3.i386.rpm\ncurl-devel-7.15.5-9.el5_6.3.i386.rpm\n\nx86_64:\ncurl-debuginfo-7.15.5-9.el5_6.3.i386.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm\ncurl-devel-7.15.5-9.el5_6.3.i386.rpm\ncurl-devel-7.15.5-9.el5_6.3.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/curl-7.15.5-9.el5_6.3.src.rpm\n\ni386:\ncurl-7.15.5-9.el5_6.3.i386.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.i386.rpm\ncurl-devel-7.15.5-9.el5_6.3.i386.rpm\n\nia64:\ncurl-7.15.5-9.el5_6.3.ia64.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.ia64.rpm\ncurl-devel-7.15.5-9.el5_6.3.ia64.rpm\n\nppc:\ncurl-7.15.5-9.el5_6.3.ppc.rpm\ncurl-7.15.5-9.el5_6.3.ppc64.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.ppc.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.ppc64.rpm\ncurl-devel-7.15.5-9.el5_6.3.ppc.rpm\ncurl-devel-7.15.5-9.el5_6.3.ppc64.rpm\n\ns390x:\ncurl-7.15.5-9.el5_6.3.s390.rpm\ncurl-7.15.5-9.el5_6.3.s390x.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.s390.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.s390x.rpm\ncurl-devel-7.15.5-9.el5_6.3.s390.rpm\ncurl-devel-7.15.5-9.el5_6.3.s390x.rpm\n\nx86_64:\ncurl-7.15.5-9.el5_6.3.i386.rpm\ncurl-7.15.5-9.el5_6.3.x86_64.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.i386.rpm\ncurl-debuginfo-7.15.5-9.el5_6.3.x86_64.rpm\ncurl-devel-7.15.5-9.el5_6.3.i386.rpm\ncurl-devel-7.15.5-9.el5_6.3.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm\n\ni386:\ncurl-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-7.19.7-26.el6_1.1.i686.rpm\n\nx86_64:\ncurl-7.19.7-26.el6_1.1.x86_64.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm\nlibcurl-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-7.19.7-26.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm\n\ni386:\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.i686.rpm\n\nx86_64:\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm\n\nx86_64:\ncurl-7.19.7-26.el6_1.1.x86_64.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm\nlibcurl-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-7.19.7-26.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm\n\nx86_64:\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm\n\ni386:\ncurl-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.i686.rpm\n\nppc64:\ncurl-7.19.7-26.el6_1.1.ppc64.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.ppc.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.ppc64.rpm\nlibcurl-7.19.7-26.el6_1.1.ppc.rpm\nlibcurl-7.19.7-26.el6_1.1.ppc64.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.ppc.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.ppc64.rpm\n\ns390x:\ncurl-7.19.7-26.el6_1.1.s390x.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.s390.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.s390x.rpm\nlibcurl-7.19.7-26.el6_1.1.s390.rpm\nlibcurl-7.19.7-26.el6_1.1.s390x.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.s390.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.s390x.rpm\n\nx86_64:\ncurl-7.19.7-26.el6_1.1.x86_64.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm\nlibcurl-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-7.19.7-26.el6_1.1.x86_64.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/curl-7.19.7-26.el6_1.1.src.rpm\n\ni386:\ncurl-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.i686.rpm\n\nx86_64:\ncurl-7.19.7-26.el6_1.1.x86_64.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.i686.rpm\ncurl-debuginfo-7.19.7-26.el6_1.1.x86_64.rpm\nlibcurl-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-7.19.7-26.el6_1.1.x86_64.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.i686.rpm\nlibcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-2192.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttp://curl.haxx.se/docs/adv_20110623.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-02-01-1 OS X Lion v10.7.3 and Security Update 2012-001\n\nOS X Lion v10.7.3 and Security Update 2012-001 is now available and\naddresses the following:\n\nAddress Book\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: An attacker in a privileged network position may intercept\nCardDAV data\nDescription: Address Book supports Secure Sockets Layer (SSL) for\naccessing CardDAV. A downgrade issue caused Address Book to attempt\nan unencrypted connection if an encrypted connection failed. An\nattacker in a privileged network position could abuse this behavior\nto intercept CardDAV data. This issue is addressed by not downgrading\nto an unencrypted connection without user approval. \nCVE-ID\nCVE-2011-3444 : Bernard Desruisseaux of Oracle Corporation\n\nApache\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Multiple vulnerabilities in Apache\nDescription: Apache is updated to version 2.2.21 to address several\nvulnerabilities, the most serious of which may lead to a denial of\nservice. Further information is available via the Apache web site at\nhttp://httpd.apache.org/\nCVE-ID\nCVE-2011-3348\n\nApache\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of SSL\n3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. \nApache disabled the \u0027empty fragment\u0027 countermeasure which prevented\nthese attacks. This issue is addressed by providing a configuration\nparameter to control the countermeasure and enabling it by default. \nCVE-ID\nCVE-2011-3389\n\nCFNetwork\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of sensitive information\nDescription: An issue existed in CFNetwork\u0027s handling of malformed\nURLs. When accessing a maliciously crafted URL, CFNetwork could send\nthe request to an incorrect origin server. This issue does not affect\nsystems prior to OS X Lion. \nCVE-ID\nCVE-2011-3246 : Erling Ellingsen of Facebook\n\nCFNetwork\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of sensitive information\nDescription: An issue existed in CFNetwork\u0027s handling of malformed\nURLs. When accessing a maliciously crafted URL, CFNetwork could send\nunexpected request headers. This issue does not affect systems prior\nto OS X Lion. \nCVE-ID\nCVE-2011-3447 : Erling Ellingsen of Facebook\n\nColorSync\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Viewing a maliciously crafted image with an embedded\nColorSync profile may lead to an unexpected application termination\nor arbitrary code execution\nDescription: An integer overflow existed in the handling of images\nwith an embedded ColorSync profile, which may lead to a heap buffer\noverflow. This issue does not affect OS X Lion systems. \nCVE-ID\nCVE-2011-0200 : binaryproof working with TippingPoint\u0027s Zero Day\nInitiative\n\nCoreAudio\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Playing maliciously crafted audio content may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of AAC\nencoded audio streams. This issue does not affect OS X Lion systems. \nCVE-ID\nCVE-2011-3252 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nCoreMedia\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A heap buffer overflow existed in CoreMedia\u0027s handling\nof H.264 encoded movie files. \nCVE-ID\nCVE-2011-3448 : Scott Stender of iSEC Partners\n\nCoreText\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing or downloading a document containing a maliciously\ncrafted embedded font may lead to an unexpected application\ntermination or arbitrary code execution\nDescription: A use after free issue existed in the handling of font\nfiles. \nCVE-ID\nCVE-2011-3449 : Will Dormann of the CERT/CC\n\nCoreUI\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Visiting a malicious website may lead to an unexpected\napplication termination or arbitrary code execution\nDescription: An unbounded stack allocation issue existed in the\nhandling of long URLs. This issue does not affect systems prior to OS\nX Lion. \nCVE-ID\nCVE-2011-3450 : Ben Syverson\n\ncurl\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: A remote server may be able to impersonate clients via\nGSSAPI requests\nDescription: When doing GSSAPI authentication, libcurl\nunconditionally performs credential delegation. This issue is\naddressed by disabling GSSAPI credential delegation. \nCVE-ID\nCVE-2011-2192\n\nData Security\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: An attacker with a privileged network position may intercept\nuser credentials or other sensitive information\nDescription: Two certificate authorities in the list of trusted root\ncertificates have independently issued intermediate certificates to\nDigiCert Malaysia. DigiCert Malaysia has issued certificates with\nweak keys that it is unable to revoke. An attacker with a privileged\nnetwork position could intercept user credentials or other sensitive\ninformation intended for a site with a certificate issued by DigiCert\nMalaysia. This issue is addressed by configuring default system trust\nsettings so that DigiCert Malaysia\u0027s certificates are not trusted. We\nwould like to acknowledge Bruce Morton of Entrust, Inc. \n\ndovecot\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of SSL\n3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. \nDovecot disabled the \u0027empty fragment\u0027 countermeasure which prevented\nthese attacks. This issue is addressed by enabling the\ncountermeasure. \nCVE-ID\nCVE-2011-3389 : Apple\n\nfilecmds\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Decompressing a maliciously crafted compressed file may lead\nto an unexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the \u0027uncompress\u0027 command\nline tool. \nCVE-ID\nCVE-2011-2895\n\nImageIO\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Viewing a maliciously crafted TIFF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in ImageIO\u0027s handling of\nCCITT Group 4 encoded TIFF files. This issue does not affect OS X\nLion systems. \nCVE-ID\nCVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies\n\nImageIO\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted TIFF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in libtiff\u0027s handling of\nThunderScan encoded TIFF images. This issue is address by updating\nlibtiff to version 3.9.5. \nCVE-ID\nCVE-2011-1167\n\nImageIO\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Multiple vulnerabilities in libpng 1.5.4\nDescription: libpng is updated to version 1.5.5 to address multiple\nvulnerabilities, the most serious of which may lead to arbitrary code\nexecution. Further information is available via the libpng website at\nhttp://www.libpng.org/pub/png/libpng.html\nCVE-ID\nCVE-2011-3328\n\nInternet Sharing\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: A Wi-Fi network created by Internet Sharing may lose\nsecurity settings after a system update\nDescription: After updating to a version of OS X Lion prior to\n10.7.3, the Wi-Fi configuration used by Internet Sharing may revert\nto factory defaults, which disables the WEP password. This issue only\naffects systems with Internet Sharing enabled and sharing the\nconnection to Wi-Fi. This issue is addressed by preserving the Wi-Fi\nconfiguration during a system update. \nCVE-ID\nCVE-2011-3452 : an anonymous researcher\n\nLibinfo\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of sensitive information\nDescription: An issue existed in Libinfo\u0027s handling of hostname\nlookup requests. Libinfo could return incorrect results for a\nmaliciously crafted hostname. This issue does not affect systems\nprior to OS X Lion. \nCVE-ID\nCVE-2011-3441 : Erling Ellingsen of Facebook\n\nlibresolv\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Applications that use OS X\u0027s libresolv library may be\nvulnerable to an unexpected application termination or arbitrary code\nexecution\nDescription: An integer overflow existed in the parsing of DNS\nresource records, which may lead to heap memory corruption. \nCVE-ID\nCVE-2011-3453 : Ilja van Sprundel of IOActive\n\nlibsecurity\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Some EV certificates may be trusted even if the\ncorresponding root has been marked as untrusted\nDescription: The certificate code trusted a root certificate to sign\nEV certificates if it was on the list of known EV issuers, even if\nthe user had marked it as \u0027Never Trust\u0027 in Keychain. The root would\nnot be trusted to sign non-EV certificates. \nCVE-ID\nCVE-2011-3422 : Alastair Houghton\n\nOpenGL\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Applications that use OS X\u0027s OpenGL implementation may be\nvulnerable to an unexpected application termination or arbitrary code\nexecution\nDescription: Multiple memory corruption issues existed in the\nhandling of GLSL compilation. \nCVE-ID\nCVE-2011-3457 : Chris Evans of the Google Chrome Security Team, and\nMarc Schoenefeld of the Red Hat Security Response Team\n\nPHP\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Multiple vulnerabilities in PHP 5.3.6\nDescription: PHP is updated to version 5.3.8 to address several\nvulnerabilities, the most serious of which may lead to arbitrary code\nexecution. Further information is available via the PHP web site at\nhttp://www.php.net\nCVE-ID\nCVE-2011-1148\nCVE-2011-1657\nCVE-2011-1938\nCVE-2011-2202\nCVE-2011-2483\nCVE-2011-3182\nCVE-2011-3189\nCVE-2011-3267\nCVE-2011-3268\n\nPHP\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in FreeType\u0027s\nhandling of Type 1 fonts. Further information is available via the\nFreeType site at http://www.freetype.org/\nCVE-ID\nCVE-2011-3256 : Apple\n\nPHP\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Multiple vulnerabilities in libpng 1.5.4\nDescription: libpng is updated to version 1.5.5 to address multiple\nvulnerabilities, the most serious of which may lead to arbitrary code\nexecution. Further information is available via the libpng website at\nhttp://www.libpng.org/pub/png/libpng.html\nCVE-ID\nCVE-2011-3328\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Opening a maliciously crafted MP4 encoded file may lead to\nan unexpected application termination or arbitrary code execution\nDescription: An uninitialized memory access issue existed in the\nhandling of MP4 encoded files. \nCVE-ID\nCVE-2011-3458 : Luigi Auriemma and pa_kt both working with\nTippingPoint\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A signedness issue existed in the handling of font\ntables embedded in QuickTime movie files. \nCVE-ID\nCVE-2011-3248 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An off by one buffer overflow existed in the handling\nof rdrf atoms in QuickTime movie files. \nCVE-ID\nCVE-2011-3459 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted JPEG2000 image file may lead\nto an unexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of JPEG2000\nfiles. \nCVE-ID\nCVE-2011-3250 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Processing a maliciously crafted PNG image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of PNG files. \nCVE-ID\nCVE-2011-3460 : Luigi Auriemma working with TippingPoint\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of FLC\nencoded movie files\nCVE-ID\nCVE-2011-3249 : Matt \u0027j00ru\u0027 Jurczyk working with TippingPoint\u0027s Zero\nDay Initiative\n\nSquirrelMail\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Multiple vulnerabilities in SquirrelMail\nDescription: SquirrelMail is updated to version 1.4.22 to address\nseveral vulnerabilities, the most serious of which is a cross-site\nscripting issue. This issue does not affect OS X Lion systems. \nFurther information is available via the SquirrelMail web site at\nhttp://www.SquirrelMail.org/\nCVE-ID\nCVE-2010-1637\nCVE-2010-2813\nCVE-2010-4554\nCVE-2010-4555\nCVE-2011-2023\n\nSubversion\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Accessing a Subversion repository may lead to the disclosure\nof sensitive information\nDescription: Subversion is updated to version 1.6.17 to address\nmultiple vulnerabilities, the most serious of which may lead to the\ndisclosure of sensitive information. Further information is available\nvia the Subversion web site at http://subversion.tigris.org/\nCVE-ID\nCVE-2011-1752\nCVE-2011-1783\nCVE-2011-1921\n\nTime Machine\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: A remote attacker may access new backups created by the\nuser\u0027s system\nDescription: The user may designate a remote AFP volume or Time\nCapsule to be used for Time Machine backups. Time Machine did not\nverify that the same device was being used for subsequent backup\noperations. An attacker who is able to spoof the remote volume could\ngain access to new backups created by the user\u0027s system. This issue\nis addressed by verifying the unique identifier associated with a\ndisk for backup operations. \nCVE-ID\nCVE-2011-3462 : Michael Roitzsch of the Technische Universitat\nDresden\n\nTomcat\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Multiple vulnerabilities in Tomcat 6.0.32\nDescription: Tomcat is updated to version 6.0.33 to address multiple\nvulnerabilities, the most serious of which may lead to the disclosure\nof sensitive information. Tomcat is only provided on Mac OS X Server\nsystems. This issue does not affect OS X Lion systems. Further\ninformation is available via the Tomcat site at\nhttp://tomcat.apache.org/\nCVE-ID\nCVE-2011-2204\n\nWebDAV Sharing\nAvailable for: OS X Lion Server v10.7 to v10.7.2\nImpact: Local users may obtain system privileges\nDescription: An issue existed in WebDAV Sharing\u0027s handling of user\nauthentication. A user with a valid account on the server or one of\nits bound directories could cause the execution of arbitrary code\nwith system privileges. This issue does not affect systems prior to\nOS X Lion. \nCVE-ID\nCVE-2011-3463 : Gordon Davisson of Crywolf\n\nWebmail\nAvailable for: OS X Lion v10.7 to v10.7.2,\nOS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted e-mail message may lead to the\ndisclosure of message content\nDescription: A cross-site scripting vulnerability existed in the\nhandling of mail messages. This issue is addressed by updating\nRoundcube Webmail to version 0.6. This issue does not affect systems\nprior to OS X Lion. Further information is available via the\nRoundcube site at http://trac.roundcube.net/\nCVE-ID\nCVE-2011-2937\n\nX11\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7 to v10.7.2, OS X Lion Server v10.7 to v10.7.2\nImpact: Viewing a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in FreeType\u0027s\nhandling of Type 1 fonts. Further information is available via the\nFreeType site at http://www.freetype.org/\nCVE-ID\nCVE-2011-3256 : Apple\n\nOS X Lion v10.7.3 and Security Update 2012-001 may be obtained from\nthe Software Update pane in System Preferences, or Apple\u0027s Software\nDownloads web site:\nhttp://www.apple.com/support/downloads/\n\nThe Software Update utility will present the update that applies\nto your system configuration. Only one is needed, either\nSecurity Update 2021-001 or OS X v10.7.3. \n\nFor OS X Lion v10.7.2\nThe download file is named: MacOSXUpd10.7.3.dmg\nIts SHA-1 digest is: 7102fe8f9f47286c45dfa35f6e84e7f730493a7c\n\nFor OS X Lion v10.7 and v10.7.1\nThe download file is named: MacOSXUpdCombo10.7.3.dmg\nIts SHA-1 digest is: 07dfce300f6801eb63d9ac13e0bec84e1862a16c\n\nFor OS X Lion Server v10.7.2\nThe download file is named: MacOSXServerUpd10.7.3.dmg\nIts SHA-1 digest is: 55a9571635d4ec088c142d68132d0d69fcb8867d\n\nFor OS X Lion Server v10.7 and v10.7.1\nThe download file is named: MacOSXServerUpdCombo10.7.3.dmg\nIts SHA-1 digest is: 2c87824f09734499ea166ea0617a3ac21ecf832b\n\nFor Mac OS X v10.6.8\nThe download file is named: SecUpd2012-001Snow.dmg\nIts SHA-1 digest is: 40875ee8cb609bbaefc8f421a9c34cc353db42b8\n\nFor Mac OS X Server v10.6.8\nThe download file is named: SecUpdSrvr2012-001.dmg\nIts SHA-1 digest is: 53b3ca5548001a9920aeabed4a034c6e4657fe20\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.16 (Darwin)\n\niQEcBAEBAgAGBQJPKYxNAAoJEGnF2JsdZQeeLiIIAMLhH2ipDFrhCsw/n4VDeF1V\nP6jSkGXC9tBBVMvw1Xq4c2ok4SI34bDfMlURAVR+dde/h6nIZR24aLQVoDLjJuIp\nRrO2dm1nQeozLJSx2NbxhVh54BucJdKp4xS1GkDNxkqcdh04RE9hRURXdKagnfGy\n9P8QQPOQmKAiWos/LYhCPDInMfrpVNvEVwP8MCDP15g6hylN4De/Oyt7ZshPshSf\nMnAFObfBTGX5KioVqTyfdlBkKUfdXHJux61QEFHn8eadX6+/6IuKbUvK9B0icc8E\npvbjOxQatFRps0KNWeIsKQc5i6iQoJhocAiIy6Y6LCuZQuSXCImY2RWXkVYzbWo=\n=c1eU\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03280632\nVersion: 1\n\nHPSBMU02764 SSRT100827 rev.1 - HP System Management Homepage (SMH) Running on Linux and Windows, Remote Cross Site Request Forgery (CSRF), Denial of Service (DoS), Execution of Arbitrary Code, Other Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2012-04-16\nLast Updated: 2012-04-16\n\nPotential Security Impact: Remote cross site request forgery (CSRF), Denial of Service (DoS), execution of arbitrary code, other vulnerabilities\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely and locally resulting in cross site request forgery (CSRF), Denial of Service (DoS), execution of arbitrary code, and other vulnerabilities. \nHP System Management Homepage (SMH) before v7.0 running on Linux and Windows. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2009-0037 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2010-0734 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2010-1452 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2010-1623 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2010-2068 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2010-2791 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2010-3436 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2010-4409 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2010-4645 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-0014 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-0195 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-1148 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-1153 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-1464 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-1467 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-1468 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-1470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-1471 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-1928 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-1938 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-1945 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6\nCVE-2011-2192 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2011-2202 (AV:N/AC:L/Au:N/C:N/I:P/A:P) 6.4\nCVE-2011-2483 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2011-3182 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-3189 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8\nCVE-2011-3267 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-3268 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-3207 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2011-3210 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-3348 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-3368 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2011-3639 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2011-3846 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2012-0135 (AV:N/AC:M/Au:S/C:N/I:N/A:P) 3.5\nCVE-2012-1993 (AV:L/AC:L/Au:S/C:P/I:P/A:N) 3.2\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett-Packard Company thanks Sow Ching Shiong coordinating with Secunia for reporting CVE-2011-3846 to security-alert@hp.com. \n\nRESOLUTION\n\nHP has provided HP System Management Homepage v7.0 or subsequent to resolve the vulnerabilities. \n\nSMH v7.0 is available here: http://h18000.www1.hp.com/products/servers/management/agents/index.html\n\nHISTORY\nVersion:1 (rev.1) 16 April 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in the title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n ----------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2012-0001\nSynopsis: VMware ESXi and ESX updates to third party library\n and ESX Service Console\nIssue date: 2012-01-30\nUpdated on: 2012-01-30 (initial advisory)\n\nCVE numbers: --- COS Kernel ---\n CVE-2011-0726, CVE-2011-1078, CVE-2011-1079,\n CVE-2011-1080, CVE-2011-1093, CVE-2011-1163,\n CVE-2011-1166, CVE-2011-1170, CVE-2011-1171,\n CVE-2011-1172, CVE-2011-1494, CVE-2011-1495,\n CVE-2011-1577, CVE-2011-1763, CVE-2010-4649,\n CVE-2011-0695, CVE-2011-0711, CVE-2011-1044,\n CVE-2011-1182, CVE-2011-1573, CVE-2011-1576,\n CVE-2011-1593, CVE-2011-1745, CVE-2011-1746,\n CVE-2011-1776, CVE-2011-1936, CVE-2011-2022,\n CVE-2011-2213, CVE-2011-2492, CVE-2011-1780,\n CVE-2011-2525, CVE-2011-2689, CVE-2011-2482,\n CVE-2011-2491, CVE-2011-2495, CVE-2011-2517,\n CVE-2011-2519, CVE-2011-2901\n --- COS cURL ---\n CVE-2011-2192\n --- COS rpm ---\n CVE-2010-2059, CVE-2011-3378\n --- COS samba ---\n CVE-2010-0547, CVE-2010-0787, CVE-2011-1678,\n CVE-2011-2522, CVE-2011-2694\n --- COS python ---\n CVE-2009-3720, CVE-2010-3493, CVE-2011-1015,\n CVE-2011-1521\n --- python library ---\n CVE-2009-3560, CVE-2009-3720, CVE-2010-1634,\n CVE-2010-2089, CVE-2011-1521\n ----------------------------------------------------------------------\n\n1. Summary\n\n VMware ESXi and ESX updates to third party library and ESX Service\n Console address several security issues. \n\n2. Relevant releases\n\n ESXi 4.1 without patch ESXi410-201201401-SG\n\n ESX 4.1 without patches ESX410-201201401-SG, ESX410-201201402-SG,\n ESX410-201201404-SG, ESX410-201201405-SG,\n ESX410-201201406-SG, ESX410-201201407-SG\n\n3. Problem Description\n\n a. ESX third party update for Service Console kernel\n\n The ESX Service Console Operating System (COS) kernel is updated to\n kernel-2.6.18-274.3.1.el5 to fix multiple security issues in the\n COS kernel. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2011-0726, CVE-2011-1078, CVE-2011-1079,\n CVE-2011-1080, CVE-2011-1093, CVE-2011-1163, CVE-2011-1166,\n CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1494,\n CVE-2011-1495, CVE-2011-1577, CVE-2011-1763, CVE-2010-4649,\n CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182,\n CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745,\n CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022,\n CVE-2011-2213, CVE-2011-2492, CVE-2011-1780, CVE-2011-2525,\n CVE-2011-2689, CVE-2011-2482, CVE-2011-2491, CVE-2011-2495,\n CVE-2011-2517, CVE-2011-2519, CVE-2011-2901 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201401-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n b. ESX third party update for Service Console cURL RPM\n\n The ESX Service Console (COS) curl RPM is updated to cURL-7.15.5.9\n resolving a security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the name CVE-2011-2192 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201402-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n c. ESX third party update for Service Console nspr and nss RPMs\n\n The ESX Service Console (COS) nspr and nss RPMs are updated to\n nspr-4.8.8-1.el5_7 and nss-3.12.10-4.el5_7 respectively resolving\n a security issues. \n\n A Certificate Authority (CA) issued fraudulent SSL certificates and\n Netscape Portable Runtime (NSPR) and Network Security Services (NSS)\n contain the built-in tokens of this fraudulent Certificate\n Authority. This update renders all SSL certificates signed by the\n fraudulent CA as untrusted for all uses. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201404-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n d. ESX third party update for Service Console rpm RPMs\n\n The ESX Service Console Operating System (COS) rpm packages are\n updated to popt-1.10.2.3-22.el5_7.2, rpm-4.4.2.3-22.el5_7.2,\n rpm-libs-4.4.2.3-22.el5_7.2 and rpm-python-4.4.2.3-22.el5_7.2\n which fixes multiple security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2010-2059 and CVE-2011-3378 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201406-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n\n e. ESX third party update for Service Console samba RPMs\n\n The ESX Service Console Operating System (COS) samba packages are\n updated to samba-client-3.0.33-3.29.el5_7.4,\n samba-common-3.0.33-3.29.el5_7.4 and\n libsmbclient-3.0.33-3.29.el5_7.4 which fixes multiple security\n issues in the Samba client. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2010-0547, CVE-2010-0787, CVE-2011-1678,\n CVE-2011-2522 and CVE-2011-2694 to these issues. \n\n Note that ESX does not include the Samba Web Administration Tool\n (SWAT) and therefore ESX COS is not affected by CVE-2011-2522 and\n CVE-2011-2694. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201407-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n f. ESX third party update for Service Console python package\n\n The ESX Service Console (COS) python package is updated to\n 2.4.3-44 which fixes multiple security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2009-3720, CVE-2010-3493, CVE-2011-1015 and\n CVE-2011-1521 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201405-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n g. ESXi update to third party component python\n\n The python third party library is updated to python 2.5.6 which\n fixes multiple security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634,\n CVE-2010-2089, and CVE-2011-1521 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 5.0 ESXi patch pending\n ESXi 4.1 ESXi ESXi410-201201401-SG\n ESXi 4.0 ESXi patch pending\n ESXi 3.5 ESXi patch pending\n\n ESX 4.1 ESX not affected\n ESX 4.0 ESX not affected\n ESX 3.5 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the checksum of your downloaded file. \n\n VMware ESXi 4.1\n ---------------\n ESXi410-201201401\n http://downloads.vmware.com/go/selfsupport-download\n md5sum: BDF86F10A973346E26C9C2CD4C424E88 \n sha1sum: CC0B92869A9AAE4F5E0E5B81BEE109BCD7DA780F\n http://kb.vmware.com/kb/2009143\n ESXi410-201201401 contains ESXi410-201201401-SG\n\n VMware ESX 4.1\n --------------\n ESX410-201201001\n http://downloads.vmware.com/go/selfsupport-download\n md5sum: 16DF9ACD3E74BCABC2494BC23AD0927F \n sha1sum: 1066AE1436E1A75BA3D541AB65296CFB9AB7A5CC\n http://kb.vmware.com/kb/2009142\n\n ESX410-201201001 contains ESX410-201201401-SG, ESX410-201201402-SG,\n ESX410-201201404-SG, ESX410-201201405-SG, ESX410-201201406-SG and\n ESX410-201201407-SG\n\n5. References\n\n CVE numbers\n\n --- COS Kernel ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0726\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1078\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1079\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1080\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1093\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1163\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1166\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1170\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1171\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1172\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1494\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1495\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1763\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0695\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1044\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1182\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1573\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1576\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1593\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1745\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1746\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1776\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1936\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2022\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2213\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2492\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1780\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2525\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2689\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2482\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2495\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2519\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2901\n --- COS cURL ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192\n --- COS rpm ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2059\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378\n --- COS samba ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694\n --- COS python ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521\n --- python library ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1634\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2089\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521\n\n ----------------------------------------------------------------------\n\n6. Change log\n\n 2012-01-30 VMSA-2012-0001\n Initial security advisory in conjunction with the release of patches\n for ESX 4.1 and ESXi 4.1 on 2012-01-30. \n\n ----------------------------------------------------------------------\n\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Advisories\nhttp://www.vmware.com/security/advisories\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2012 VMware Inc. All rights reserved. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 9.8.3 (Build 4028)\nCharset: utf-8\n\nwj8DBQFPJ5DIDEcm8Vbi9kMRAnzCAKCmaAoDp49d61Mr1emzh/U0N8vbgACdFZk8\nf2pLxi537s+ew4dvnYNWlJ8=\n=OAh4\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201203-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: cURL: Multiple vulnerabilities\n Date: March 06, 2012\n Bugs: #308645, #373235, #400799\n ID: 201203-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in cURL, the worst of which\nmight allow remote execution of arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/curl \u003c 7.24.0 \u003e= 7.24.0\n\nDescription\n===========\n\nMultiple vulnerabilities have been found in cURL:\n\n* When zlib is enabled, the amount of data sent to an application for\n automatic decompression is not restricted (CVE-2010-0734). \n* When SSL is enabled, cURL improperly disables the OpenSSL workaround\n to mitigate an information disclosure vulnerability in the SSL and\n TLS protocols (CVE-2011-3389). \n* libcurl does not properly verify file paths for escape control\n characters in IMAP, POP3 or SMTP URLs (CVE-2012-0036). \n\nImpact\n======\n\nA remote attacker could entice a user or automated process to open a\nspecially crafted file or URL using cURL, possibly resulting in the\nremote execution of arbitrary code, a Denial of Service condition,\ndisclosure of sensitive information, or unwanted actions performed via\nthe IMAP, POP3 or SMTP protocols. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll cURL users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/curl-7.24.0\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-0734\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0734\n[ 2 ] CVE-2011-2192\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2192\n[ 3 ] CVE-2011-3389\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389\n[ 4 ] CVE-2012-0036\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0036\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201203-02.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2011-2192" }, { "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "db": "BID", "id": "48434" }, { "db": "VULHUB", "id": "VHN-50137" }, { "db": "PACKETSTORM", "id": "102739" }, { "db": "PACKETSTORM", "id": "102820" }, { "db": "PACKETSTORM", "id": "109373" }, { "db": "PACKETSTORM", "id": "111915" }, { "db": "PACKETSTORM", "id": "103266" }, { "db": "PACKETSTORM", "id": "109299" }, { "db": "PACKETSTORM", "id": "110497" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-50137", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-50137" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-2192", "trust": 3.5 }, { "db": "SECUNIA", "id": "45067", "trust": 2.5 }, { "db": "SECUNIA", "id": "45181", "trust": 1.7 }, { "db": "SECUNIA", "id": "45088", "trust": 1.7 }, { "db": "SECUNIA", "id": "45047", "trust": 1.7 }, { "db": "SECUNIA", "id": "45144", "trust": 1.7 }, { "db": "SECUNIA", "id": "48256", "trust": 1.7 }, { "db": "SECTRACK", "id": "1025713", "trust": 1.7 }, { "db": "BID", "id": "48434", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2011-001894", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201106-322", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "102820", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "102739", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "103266", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-50137", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109373", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "111915", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109299", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110497", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-50137" }, { "db": "BID", "id": "48434" }, { "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "db": "PACKETSTORM", "id": "102739" }, { "db": "PACKETSTORM", "id": "102820" }, { "db": "PACKETSTORM", "id": "109373" }, { "db": "PACKETSTORM", "id": "111915" }, { "db": "PACKETSTORM", "id": "103266" }, { "db": "PACKETSTORM", "id": "109299" }, { "db": "PACKETSTORM", "id": "110497" }, { "db": "CNNVD", "id": "CNNVD-201106-322" }, { "db": "NVD", "id": "CVE-2011-2192" } ] }, "id": "VAR-201107-0125", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-50137" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:50:23.993000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "curl-7.15.5-9.AXS3.3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1457" }, { "title": "2228", "trust": 0.8, "url": "https://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2228" }, { "title": "RHSA-2011:0918", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2011-0918.html" }, { "title": "adv_20110623", "trust": 0.8, "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "title": "VMSA-2012-0001", "trust": 0.8, "url": "http://www.vmware.com/jp/support/support-resources/advisories/vmsa-2012-0001.html" }, { "title": "cURL GSSAPI Repair measures for certificate authorization vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=119609" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "db": "CNNVD", "id": "CNNVD-201106-322" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-50137" }, { "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "db": "NVD", "id": "CVE-2011-2192" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://secunia.com/advisories/45067" }, { "trust": 2.1, "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "trust": 1.8, "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1025713" }, { "trust": 1.7, "url": "http://secunia.com/advisories/45047" }, { "trust": 1.7, "url": "http://secunia.com/advisories/45088" }, { "trust": 1.7, "url": "http://secunia.com/advisories/45144" }, { "trust": 1.7, "url": "http://secunia.com/advisories/45181" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48256" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2012/feb/msg00000.html" }, { "trust": 1.7, "url": "http://www.debian.org/security/2011/dsa-2271" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-june/061992.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-july/062287.html" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:116" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2011-0918.html" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-1158-1" }, { "trust": 1.7, "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht5130" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2192" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2192" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/48434" }, { "trust": 0.6, "url": "http://support.avaya.com/css/p8/documents/100147330" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2192" }, { "trust": 0.3, "url": "http://curl.haxx.se/" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1148" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3182" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2202" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1938" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2483" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3189" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0734" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-2192.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-0918.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2204" }, { "trust": 0.1, "url": "http://www.php.net" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1783" }, { "trust": 0.1, "url": "http://tomcat.apache.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2023" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3252" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1167" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3249" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0200" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1752" }, { "trust": 0.1, "url": "http://trac.roundcube.net/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3256" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4554" }, { "trust": 0.1, "url": "http://www.freetype.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2895" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0241" }, { "trust": 0.1, "url": "http://www.squirrelmail.org/" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "http://httpd.apache.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1921" }, { "trust": 0.1, "url": "http://www.libpng.org/pub/png/libpng.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3250" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2813" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1657" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4555" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3246" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2937" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3248" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1637" }, { "trust": 0.1, "url": "http://subversion.tigris.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1623" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4409" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1468" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3192" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1467" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1471" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1452" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1470" }, { "trust": 0.1, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "http://h18000.www1.hp.com/products/servers/management/agents/index.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4645" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1945" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2068" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1928" }, { "trust": 0.1, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0014" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1464" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1153" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0037" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2791" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://store.mandriva.com/product_info.php?cpath=149\u0026amp;products_id=490" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0711" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2495" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2901" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2522" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1166" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1163" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1093" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1780" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2525" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1746" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4649" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4649" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1078" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1170" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1745" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3560" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1163" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1936" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1494" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2689" }, { "trust": 0.1, "url": "http://downloads.vmware.com/go/selfsupport-download" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2519" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0726" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3560" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2009143" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1763" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1166" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1044" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2482" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1078" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1521" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0711" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1171" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2213" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1079" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0547" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0787" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1521" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1577" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2491" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2059" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1172" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1172" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0726" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2089" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3720" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1678" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1182" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1080" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1080" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1634" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0695" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1494" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0787" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0695" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2517" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1079" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1044" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3720" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2009142" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2022" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1593" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1182" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1170" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2089" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2694" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0547" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2059" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1495" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1093" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3493" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1576" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3378" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1634" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1171" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1495" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1776" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0036" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2192" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0734" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3389" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0036" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "VULHUB", "id": "VHN-50137" }, { "db": "BID", "id": "48434" }, { "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "db": "PACKETSTORM", "id": "102739" }, { "db": "PACKETSTORM", "id": "102820" }, { "db": "PACKETSTORM", "id": "109373" }, { "db": "PACKETSTORM", "id": "111915" }, { "db": "PACKETSTORM", "id": "103266" }, { "db": "PACKETSTORM", "id": "109299" }, { "db": "PACKETSTORM", "id": "110497" }, { "db": "CNNVD", "id": "CNNVD-201106-322" }, { "db": "NVD", "id": "CVE-2011-2192" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-50137" }, { "db": "BID", "id": "48434" }, { "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "db": "PACKETSTORM", "id": "102739" }, { "db": "PACKETSTORM", "id": "102820" }, { "db": "PACKETSTORM", "id": "109373" }, { "db": "PACKETSTORM", "id": "111915" }, { "db": "PACKETSTORM", "id": "103266" }, { "db": "PACKETSTORM", "id": "109299" }, { "db": "PACKETSTORM", "id": "110497" }, { "db": "CNNVD", "id": "CNNVD-201106-322" }, { "db": "NVD", "id": "CVE-2011-2192" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-07-07T00:00:00", "db": "VULHUB", "id": "VHN-50137" }, { "date": "2011-06-24T00:00:00", "db": "BID", "id": "48434" }, { "date": "2011-07-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "date": "2011-07-02T17:00:00", "db": "PACKETSTORM", "id": "102739" }, { "date": "2011-07-05T19:56:28", "db": "PACKETSTORM", "id": "102820" }, { "date": "2012-02-03T00:24:52", "db": "PACKETSTORM", "id": "109373" }, { "date": "2012-04-17T20:34:39", "db": "PACKETSTORM", "id": "111915" }, { "date": "2011-07-22T14:38:04", "db": "PACKETSTORM", "id": "103266" }, { "date": "2012-01-30T12:12:00", "db": "PACKETSTORM", "id": "109299" }, { "date": "2012-03-07T00:01:57", "db": "PACKETSTORM", "id": "110497" }, { "date": "2011-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201106-322" }, { "date": "2011-07-07T21:55:02.320000", "db": "NVD", "id": "CVE-2011-2192" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-27T00:00:00", "db": "VULHUB", "id": "VHN-50137" }, { "date": "2015-04-13T20:55:00", "db": "BID", "id": "48434" }, { "date": "2012-12-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001894" }, { "date": "2021-06-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201106-322" }, { "date": "2020-05-27T20:42:18.200000", "db": "NVD", "id": "CVE-2011-2192" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "103266" }, { "db": "PACKETSTORM", "id": "110497" }, { "db": "CNNVD", "id": "CNNVD-201106-322" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "libcurl of Curl_input_negotiate Function spoofing client vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001894" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201106-322" } ], "trust": 0.6 } }
rhsa-2011_0918
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated curl packages that fix one security issue are now available for Red\nHat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "cURL provides the libcurl library and a command line tool for downloading\nfiles from servers using various protocols, including HTTP, FTP, and LDAP.\n\nIt was found that cURL always performed credential delegation when\nauthenticating with GSSAPI. A rogue server could use this flaw to obtain\nthe client\u0027s credentials and impersonate that client to other servers that\nare using GSSAPI. (CVE-2011-2192)\n\nUsers of curl should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. All running applications using\nlibcurl must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0918", "url": "https://access.redhat.com/errata/RHSA-2011:0918" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://curl.haxx.se/docs/adv_20110623.html", "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "category": "external", "summary": "711454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0918.json" } ], "title": "Red Hat Security Advisory: curl security update", "tracking": { "current_release_date": "2024-11-22T04:28:45+00:00", "generator": { "date": "2024-11-22T04:28:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0918", "initial_release_date": "2011-07-05T17:52:00+00:00", "revision_history": [ { "date": "2011-07-05T17:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-07-05T13:57:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:28:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-17.el4.ia64", "product": { "name": "curl-0:7.12.1-17.el4.ia64", "product_id": "curl-0:7.12.1-17.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-17.el4?arch=ia64" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-17.el4.ia64", "product": { "name": "curl-devel-0:7.12.1-17.el4.ia64", "product_id": "curl-devel-0:7.12.1-17.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-17.el4?arch=ia64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-17.el4.ia64", "product": { "name": "curl-debuginfo-0:7.12.1-17.el4.ia64", "product_id": "curl-debuginfo-0:7.12.1-17.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-17.el4?arch=ia64" } } }, { "category": "product_version", "name": "curl-0:7.15.5-9.el5_6.3.ia64", "product": { "name": "curl-0:7.15.5-9.el5_6.3.ia64", "product_id": "curl-0:7.15.5-9.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.15.5-9.el5_6.3?arch=ia64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ia64", "product": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ia64", "product_id": "curl-debuginfo-0:7.15.5-9.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.15.5-9.el5_6.3?arch=ia64" } } }, { "category": "product_version", "name": "curl-devel-0:7.15.5-9.el5_6.3.ia64", "product": { "name": "curl-devel-0:7.15.5-9.el5_6.3.ia64", "product_id": "curl-devel-0:7.15.5-9.el5_6.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.15.5-9.el5_6.3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-17.el4.i386", "product": { "name": "curl-0:7.12.1-17.el4.i386", "product_id": "curl-0:7.12.1-17.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-17.el4?arch=i386" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-17.el4.i386", "product": { "name": "curl-debuginfo-0:7.12.1-17.el4.i386", "product_id": "curl-debuginfo-0:7.12.1-17.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-17.el4?arch=i386" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-17.el4.i386", "product": { "name": "curl-devel-0:7.12.1-17.el4.i386", "product_id": "curl-devel-0:7.12.1-17.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-17.el4?arch=i386" } } }, { "category": "product_version", "name": "curl-0:7.15.5-9.el5_6.3.i386", "product": { "name": "curl-0:7.15.5-9.el5_6.3.i386", "product_id": "curl-0:7.15.5-9.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.15.5-9.el5_6.3?arch=i386" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.i386", "product": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.i386", "product_id": "curl-debuginfo-0:7.15.5-9.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.15.5-9.el5_6.3?arch=i386" } } }, { "category": "product_version", "name": "curl-devel-0:7.15.5-9.el5_6.3.i386", "product": { "name": "curl-devel-0:7.15.5-9.el5_6.3.i386", "product_id": "curl-devel-0:7.15.5-9.el5_6.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.15.5-9.el5_6.3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-17.el4.src", "product": { "name": "curl-0:7.12.1-17.el4.src", "product_id": "curl-0:7.12.1-17.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-17.el4?arch=src" } } }, { "category": "product_version", "name": "curl-0:7.15.5-9.el5_6.3.src", "product": { "name": "curl-0:7.15.5-9.el5_6.3.src", "product_id": "curl-0:7.15.5-9.el5_6.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.15.5-9.el5_6.3?arch=src" } } }, { "category": "product_version", "name": "curl-0:7.19.7-26.el6_1.1.src", "product": { "name": "curl-0:7.19.7-26.el6_1.1.src", "product_id": "curl-0:7.19.7-26.el6_1.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.19.7-26.el6_1.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-17.el4.x86_64", "product": { "name": "curl-0:7.12.1-17.el4.x86_64", "product_id": "curl-0:7.12.1-17.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-17.el4?arch=x86_64" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-17.el4.x86_64", "product": { "name": "curl-devel-0:7.12.1-17.el4.x86_64", "product_id": "curl-devel-0:7.12.1-17.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-17.el4?arch=x86_64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-17.el4.x86_64", "product": { "name": "curl-debuginfo-0:7.12.1-17.el4.x86_64", "product_id": "curl-debuginfo-0:7.12.1-17.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-17.el4?arch=x86_64" } } }, { "category": "product_version", "name": "curl-0:7.15.5-9.el5_6.3.x86_64", "product": { "name": "curl-0:7.15.5-9.el5_6.3.x86_64", "product_id": "curl-0:7.15.5-9.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.15.5-9.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64", "product": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64", "product_id": "curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.15.5-9.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "curl-devel-0:7.15.5-9.el5_6.3.x86_64", "product": { "name": "curl-devel-0:7.15.5-9.el5_6.3.x86_64", "product_id": "curl-devel-0:7.15.5-9.el5_6.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.15.5-9.el5_6.3?arch=x86_64" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.19.7-26.el6_1.1.x86_64", "product": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.x86_64", "product_id": "libcurl-devel-0:7.19.7-26.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.19.7-26.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64", "product": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64", "product_id": "curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.19.7-26.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "curl-0:7.19.7-26.el6_1.1.x86_64", "product": { "name": "curl-0:7.19.7-26.el6_1.1.x86_64", "product_id": "curl-0:7.19.7-26.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.19.7-26.el6_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libcurl-0:7.19.7-26.el6_1.1.x86_64", "product": { "name": "libcurl-0:7.19.7-26.el6_1.1.x86_64", "product_id": "libcurl-0:7.19.7-26.el6_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.19.7-26.el6_1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-17.el4.ppc64", "product": { "name": "curl-0:7.12.1-17.el4.ppc64", "product_id": "curl-0:7.12.1-17.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-17.el4?arch=ppc64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-17.el4.ppc64", "product": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc64", "product_id": "curl-debuginfo-0:7.12.1-17.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-17.el4?arch=ppc64" } } }, { "category": "product_version", "name": "curl-0:7.15.5-9.el5_6.3.ppc64", "product": { "name": "curl-0:7.15.5-9.el5_6.3.ppc64", "product_id": "curl-0:7.15.5-9.el5_6.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.15.5-9.el5_6.3?arch=ppc64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64", "product": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64", "product_id": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.15.5-9.el5_6.3?arch=ppc64" } } }, { "category": "product_version", "name": "curl-devel-0:7.15.5-9.el5_6.3.ppc64", "product": { "name": "curl-devel-0:7.15.5-9.el5_6.3.ppc64", "product_id": "curl-devel-0:7.15.5-9.el5_6.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.15.5-9.el5_6.3?arch=ppc64" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc64", "product": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc64", "product_id": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.19.7-26.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64", "product": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64", "product_id": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.19.7-26.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "curl-0:7.19.7-26.el6_1.1.ppc64", "product": { "name": "curl-0:7.19.7-26.el6_1.1.ppc64", "product_id": "curl-0:7.19.7-26.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.19.7-26.el6_1.1?arch=ppc64" } } }, { "category": "product_version", "name": "libcurl-0:7.19.7-26.el6_1.1.ppc64", "product": { "name": "libcurl-0:7.19.7-26.el6_1.1.ppc64", "product_id": "libcurl-0:7.19.7-26.el6_1.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.19.7-26.el6_1.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-17.el4.ppc", "product": { "name": "curl-0:7.12.1-17.el4.ppc", "product_id": "curl-0:7.12.1-17.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-17.el4?arch=ppc" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-17.el4.ppc", "product": { "name": "curl-devel-0:7.12.1-17.el4.ppc", "product_id": "curl-devel-0:7.12.1-17.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-17.el4?arch=ppc" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-17.el4.ppc", "product": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc", "product_id": "curl-debuginfo-0:7.12.1-17.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-17.el4?arch=ppc" } } }, { "category": "product_version", "name": "curl-0:7.15.5-9.el5_6.3.ppc", "product": { "name": "curl-0:7.15.5-9.el5_6.3.ppc", "product_id": "curl-0:7.15.5-9.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.15.5-9.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc", "product": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc", "product_id": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.15.5-9.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "curl-devel-0:7.15.5-9.el5_6.3.ppc", "product": { "name": "curl-devel-0:7.15.5-9.el5_6.3.ppc", "product_id": "curl-devel-0:7.15.5-9.el5_6.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.15.5-9.el5_6.3?arch=ppc" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc", "product": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc", "product_id": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.19.7-26.el6_1.1?arch=ppc" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc", "product": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc", "product_id": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.19.7-26.el6_1.1?arch=ppc" } } }, { "category": "product_version", "name": "libcurl-0:7.19.7-26.el6_1.1.ppc", "product": { "name": "libcurl-0:7.19.7-26.el6_1.1.ppc", "product_id": "libcurl-0:7.19.7-26.el6_1.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.19.7-26.el6_1.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-17.el4.s390x", "product": { "name": "curl-0:7.12.1-17.el4.s390x", "product_id": "curl-0:7.12.1-17.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-17.el4?arch=s390x" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-17.el4.s390x", "product": { "name": "curl-devel-0:7.12.1-17.el4.s390x", "product_id": "curl-devel-0:7.12.1-17.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-17.el4?arch=s390x" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-17.el4.s390x", "product": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390x", "product_id": "curl-debuginfo-0:7.12.1-17.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-17.el4?arch=s390x" } } }, { "category": "product_version", "name": "curl-0:7.15.5-9.el5_6.3.s390x", "product": { "name": "curl-0:7.15.5-9.el5_6.3.s390x", "product_id": "curl-0:7.15.5-9.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.15.5-9.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390x", "product": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390x", "product_id": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.15.5-9.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "curl-devel-0:7.15.5-9.el5_6.3.s390x", "product": { "name": "curl-devel-0:7.15.5-9.el5_6.3.s390x", "product_id": "curl-devel-0:7.15.5-9.el5_6.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.15.5-9.el5_6.3?arch=s390x" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.19.7-26.el6_1.1.s390x", "product": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.s390x", "product_id": "libcurl-devel-0:7.19.7-26.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.19.7-26.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390x", "product": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390x", "product_id": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.19.7-26.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "curl-0:7.19.7-26.el6_1.1.s390x", "product": { "name": "curl-0:7.19.7-26.el6_1.1.s390x", "product_id": "curl-0:7.19.7-26.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.19.7-26.el6_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libcurl-0:7.19.7-26.el6_1.1.s390x", "product": { "name": "libcurl-0:7.19.7-26.el6_1.1.s390x", "product_id": "libcurl-0:7.19.7-26.el6_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.19.7-26.el6_1.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "curl-0:7.12.1-17.el4.s390", "product": { "name": "curl-0:7.12.1-17.el4.s390", "product_id": "curl-0:7.12.1-17.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.12.1-17.el4?arch=s390" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.12.1-17.el4.s390", "product": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390", "product_id": "curl-debuginfo-0:7.12.1-17.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.12.1-17.el4?arch=s390" } } }, { "category": "product_version", "name": "curl-devel-0:7.12.1-17.el4.s390", "product": { "name": "curl-devel-0:7.12.1-17.el4.s390", "product_id": "curl-devel-0:7.12.1-17.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.12.1-17.el4?arch=s390" } } }, { "category": "product_version", "name": "curl-0:7.15.5-9.el5_6.3.s390", "product": { "name": "curl-0:7.15.5-9.el5_6.3.s390", "product_id": "curl-0:7.15.5-9.el5_6.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.15.5-9.el5_6.3?arch=s390" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390", "product": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390", "product_id": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.15.5-9.el5_6.3?arch=s390" } } }, { "category": "product_version", "name": "curl-devel-0:7.15.5-9.el5_6.3.s390", "product": { "name": "curl-devel-0:7.15.5-9.el5_6.3.s390", "product_id": "curl-devel-0:7.15.5-9.el5_6.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-devel@7.15.5-9.el5_6.3?arch=s390" } } }, { "category": "product_version", "name": "libcurl-devel-0:7.19.7-26.el6_1.1.s390", "product": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.s390", "product_id": "libcurl-devel-0:7.19.7-26.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.19.7-26.el6_1.1?arch=s390" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390", "product": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390", "product_id": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.19.7-26.el6_1.1?arch=s390" } } }, { "category": "product_version", "name": "libcurl-0:7.19.7-26.el6_1.1.s390", "product": { "name": "libcurl-0:7.19.7-26.el6_1.1.s390", "product_id": "libcurl-0:7.19.7-26.el6_1.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.19.7-26.el6_1.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libcurl-devel-0:7.19.7-26.el6_1.1.i686", "product": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.i686", "product_id": "libcurl-devel-0:7.19.7-26.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl-devel@7.19.7-26.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.i686", "product": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.i686", "product_id": "curl-debuginfo-0:7.19.7-26.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl-debuginfo@7.19.7-26.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "libcurl-0:7.19.7-26.el6_1.1.i686", "product": { "name": "libcurl-0:7.19.7-26.el6_1.1.i686", "product_id": "libcurl-0:7.19.7-26.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcurl@7.19.7-26.el6_1.1?arch=i686" } } }, { "category": "product_version", "name": "curl-0:7.19.7-26.el6_1.1.i686", "product": { "name": "curl-0:7.19.7-26.el6_1.1.i686", "product_id": "curl-0:7.19.7-26.el6_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/curl@7.19.7-26.el6_1.1?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-17.el4.i386" }, "product_reference": "curl-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-17.el4.ppc64" }, "product_reference": "curl-0:7.12.1-17.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-17.el4.s390" }, "product_reference": "curl-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-17.el4.src" }, "product_reference": "curl-0:7.12.1-17.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-17.el4.i386" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-17.el4.ppc64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-17.el4.s390" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-debuginfo-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-17.el4.i386" }, "product_reference": "curl-devel-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-devel-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-devel-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-17.el4.s390" }, "product_reference": "curl-devel-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-devel-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:curl-devel-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-devel-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-17.el4.i386" }, "product_reference": "curl-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-17.el4.ppc64" }, "product_reference": "curl-0:7.12.1-17.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-17.el4.s390" }, "product_reference": "curl-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-17.el4.src" }, "product_reference": "curl-0:7.12.1-17.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-17.el4.i386" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ppc64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-17.el4.s390" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-debuginfo-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-17.el4.i386" }, "product_reference": "curl-devel-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-devel-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-devel-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-17.el4.s390" }, "product_reference": "curl-devel-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-devel-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:curl-devel-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-devel-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-17.el4.i386" }, "product_reference": "curl-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-17.el4.ppc64" }, "product_reference": "curl-0:7.12.1-17.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-17.el4.s390" }, "product_reference": "curl-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-17.el4.src" }, "product_reference": "curl-0:7.12.1-17.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-17.el4.i386" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-17.el4.ppc64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-17.el4.s390" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-debuginfo-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-17.el4.i386" }, "product_reference": "curl-devel-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-devel-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-devel-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-17.el4.s390" }, "product_reference": "curl-devel-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-devel-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:curl-devel-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-devel-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-17.el4.i386" }, "product_reference": "curl-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-17.el4.ppc64" }, "product_reference": "curl-0:7.12.1-17.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-17.el4.s390" }, "product_reference": "curl-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-17.el4.src" }, "product_reference": "curl-0:7.12.1-17.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-17.el4.i386" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-17.el4.ppc64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-17.el4.s390" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-debuginfo-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-debuginfo-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-17.el4.i386" }, "product_reference": "curl-devel-0:7.12.1-17.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-17.el4.ia64" }, "product_reference": "curl-devel-0:7.12.1-17.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-17.el4.ppc" }, "product_reference": "curl-devel-0:7.12.1-17.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-17.el4.s390" }, "product_reference": "curl-devel-0:7.12.1-17.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-17.el4.s390x" }, "product_reference": "curl-devel-0:7.12.1-17.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.12.1-17.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:curl-devel-0:7.12.1-17.el4.x86_64" }, "product_reference": "curl-devel-0:7.12.1-17.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.15.5-9.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.i386" }, "product_reference": "curl-0:7.15.5-9.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.15.5-9.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ia64" }, "product_reference": "curl-0:7.15.5-9.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.15.5-9.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ppc" }, "product_reference": "curl-0:7.15.5-9.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.15.5-9.el5_6.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ppc64" }, "product_reference": "curl-0:7.15.5-9.el5_6.3.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.15.5-9.el5_6.3.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.s390" }, "product_reference": "curl-0:7.15.5-9.el5_6.3.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.15.5-9.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.s390x" }, "product_reference": "curl-0:7.15.5-9.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.15.5-9.el5_6.3.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.src" }, "product_reference": "curl-0:7.15.5-9.el5_6.3.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.15.5-9.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.x86_64" }, "product_reference": "curl-0:7.15.5-9.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.i386" }, "product_reference": "curl-debuginfo-0:7.15.5-9.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ia64" }, "product_reference": "curl-debuginfo-0:7.15.5-9.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ppc" }, "product_reference": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64" }, "product_reference": "curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.s390" }, "product_reference": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.s390x" }, "product_reference": "curl-debuginfo-0:7.15.5-9.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64" }, "product_reference": "curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.15.5-9.el5_6.3.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.i386" }, "product_reference": "curl-devel-0:7.15.5-9.el5_6.3.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.15.5-9.el5_6.3.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ia64" }, "product_reference": "curl-devel-0:7.15.5-9.el5_6.3.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.15.5-9.el5_6.3.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ppc" }, "product_reference": "curl-devel-0:7.15.5-9.el5_6.3.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.15.5-9.el5_6.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ppc64" }, "product_reference": "curl-devel-0:7.15.5-9.el5_6.3.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.15.5-9.el5_6.3.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.s390" }, "product_reference": "curl-devel-0:7.15.5-9.el5_6.3.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.15.5-9.el5_6.3.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.s390x" }, "product_reference": "curl-devel-0:7.15.5-9.el5_6.3.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-devel-0:7.15.5-9.el5_6.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.x86_64" }, "product_reference": "curl-devel-0:7.15.5-9.el5_6.3.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.19.7-26.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.i686" }, "product_reference": "curl-0:7.19.7-26.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.19.7-26.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.ppc64" }, "product_reference": "curl-0:7.19.7-26.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.19.7-26.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.s390x" }, "product_reference": "curl-0:7.19.7-26.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.19.7-26.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.src" }, "product_reference": "curl-0:7.19.7-26.el6_1.1.src", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-0:7.19.7-26.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.x86_64" }, "product_reference": "curl-0:7.19.7-26.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.i686" }, "product_reference": "curl-debuginfo-0:7.19.7-26.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.ppc" }, "product_reference": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64" }, "product_reference": "curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.s390" }, "product_reference": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.s390x" }, "product_reference": "curl-debuginfo-0:7.19.7-26.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64" }, "product_reference": "curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.19.7-26.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.i686" }, "product_reference": "libcurl-0:7.19.7-26.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.19.7-26.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.ppc" }, "product_reference": "libcurl-0:7.19.7-26.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.19.7-26.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.ppc64" }, "product_reference": "libcurl-0:7.19.7-26.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.19.7-26.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.s390" }, "product_reference": "libcurl-0:7.19.7-26.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.19.7-26.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.s390x" }, "product_reference": "libcurl-0:7.19.7-26.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-0:7.19.7-26.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.x86_64" }, "product_reference": "libcurl-0:7.19.7-26.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.i686" }, "product_reference": "libcurl-devel-0:7.19.7-26.el6_1.1.i686", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.ppc" }, "product_reference": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.ppc64" }, "product_reference": "libcurl-devel-0:7.19.7-26.el6_1.1.ppc64", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.s390" }, "product_reference": "libcurl-devel-0:7.19.7-26.el6_1.1.s390", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.s390x" }, "product_reference": "libcurl-devel-0:7.19.7-26.el6_1.1.s390x", "relates_to_product_reference": "6Server-6.1.z" }, { "category": "default_component_of", "full_product_name": { "name": "libcurl-devel-0:7.19.7-26.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.x86_64" }, "product_reference": "libcurl-devel-0:7.19.7-26.el6_1.1.x86_64", "relates_to_product_reference": "6Server-6.1.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2192", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711454" } ], "notes": [ { "category": "description", "text": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Improper delegation of client credentials during GSS negotiation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:curl-0:7.12.1-17.el4.i386", "4AS:curl-0:7.12.1-17.el4.ia64", "4AS:curl-0:7.12.1-17.el4.ppc", "4AS:curl-0:7.12.1-17.el4.ppc64", "4AS:curl-0:7.12.1-17.el4.s390", "4AS:curl-0:7.12.1-17.el4.s390x", "4AS:curl-0:7.12.1-17.el4.src", "4AS:curl-0:7.12.1-17.el4.x86_64", "4AS:curl-debuginfo-0:7.12.1-17.el4.i386", "4AS:curl-debuginfo-0:7.12.1-17.el4.ia64", "4AS:curl-debuginfo-0:7.12.1-17.el4.ppc", "4AS:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4AS:curl-debuginfo-0:7.12.1-17.el4.s390", "4AS:curl-debuginfo-0:7.12.1-17.el4.s390x", "4AS:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4AS:curl-devel-0:7.12.1-17.el4.i386", "4AS:curl-devel-0:7.12.1-17.el4.ia64", "4AS:curl-devel-0:7.12.1-17.el4.ppc", "4AS:curl-devel-0:7.12.1-17.el4.s390", "4AS:curl-devel-0:7.12.1-17.el4.s390x", "4AS:curl-devel-0:7.12.1-17.el4.x86_64", "4Desktop:curl-0:7.12.1-17.el4.i386", "4Desktop:curl-0:7.12.1-17.el4.ia64", "4Desktop:curl-0:7.12.1-17.el4.ppc", "4Desktop:curl-0:7.12.1-17.el4.ppc64", "4Desktop:curl-0:7.12.1-17.el4.s390", "4Desktop:curl-0:7.12.1-17.el4.s390x", "4Desktop:curl-0:7.12.1-17.el4.src", "4Desktop:curl-0:7.12.1-17.el4.x86_64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.i386", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ia64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ppc", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.s390", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.s390x", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4Desktop:curl-devel-0:7.12.1-17.el4.i386", "4Desktop:curl-devel-0:7.12.1-17.el4.ia64", "4Desktop:curl-devel-0:7.12.1-17.el4.ppc", "4Desktop:curl-devel-0:7.12.1-17.el4.s390", "4Desktop:curl-devel-0:7.12.1-17.el4.s390x", "4Desktop:curl-devel-0:7.12.1-17.el4.x86_64", "4ES:curl-0:7.12.1-17.el4.i386", "4ES:curl-0:7.12.1-17.el4.ia64", "4ES:curl-0:7.12.1-17.el4.ppc", "4ES:curl-0:7.12.1-17.el4.ppc64", "4ES:curl-0:7.12.1-17.el4.s390", "4ES:curl-0:7.12.1-17.el4.s390x", "4ES:curl-0:7.12.1-17.el4.src", "4ES:curl-0:7.12.1-17.el4.x86_64", "4ES:curl-debuginfo-0:7.12.1-17.el4.i386", "4ES:curl-debuginfo-0:7.12.1-17.el4.ia64", "4ES:curl-debuginfo-0:7.12.1-17.el4.ppc", "4ES:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4ES:curl-debuginfo-0:7.12.1-17.el4.s390", "4ES:curl-debuginfo-0:7.12.1-17.el4.s390x", "4ES:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4ES:curl-devel-0:7.12.1-17.el4.i386", "4ES:curl-devel-0:7.12.1-17.el4.ia64", "4ES:curl-devel-0:7.12.1-17.el4.ppc", "4ES:curl-devel-0:7.12.1-17.el4.s390", "4ES:curl-devel-0:7.12.1-17.el4.s390x", "4ES:curl-devel-0:7.12.1-17.el4.x86_64", "4WS:curl-0:7.12.1-17.el4.i386", "4WS:curl-0:7.12.1-17.el4.ia64", "4WS:curl-0:7.12.1-17.el4.ppc", "4WS:curl-0:7.12.1-17.el4.ppc64", "4WS:curl-0:7.12.1-17.el4.s390", "4WS:curl-0:7.12.1-17.el4.s390x", "4WS:curl-0:7.12.1-17.el4.src", "4WS:curl-0:7.12.1-17.el4.x86_64", "4WS:curl-debuginfo-0:7.12.1-17.el4.i386", "4WS:curl-debuginfo-0:7.12.1-17.el4.ia64", "4WS:curl-debuginfo-0:7.12.1-17.el4.ppc", "4WS:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4WS:curl-debuginfo-0:7.12.1-17.el4.s390", "4WS:curl-debuginfo-0:7.12.1-17.el4.s390x", "4WS:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4WS:curl-devel-0:7.12.1-17.el4.i386", "4WS:curl-devel-0:7.12.1-17.el4.ia64", "4WS:curl-devel-0:7.12.1-17.el4.ppc", "4WS:curl-devel-0:7.12.1-17.el4.s390", "4WS:curl-devel-0:7.12.1-17.el4.s390x", "4WS:curl-devel-0:7.12.1-17.el4.x86_64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.src", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.x86_64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.x86_64", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.src", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2192" }, { "category": "external", "summary": "RHBZ#711454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2192", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2192" } ], "release_date": "2011-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-07-05T17:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:curl-0:7.12.1-17.el4.i386", "4AS:curl-0:7.12.1-17.el4.ia64", "4AS:curl-0:7.12.1-17.el4.ppc", "4AS:curl-0:7.12.1-17.el4.ppc64", "4AS:curl-0:7.12.1-17.el4.s390", "4AS:curl-0:7.12.1-17.el4.s390x", "4AS:curl-0:7.12.1-17.el4.src", "4AS:curl-0:7.12.1-17.el4.x86_64", "4AS:curl-debuginfo-0:7.12.1-17.el4.i386", "4AS:curl-debuginfo-0:7.12.1-17.el4.ia64", "4AS:curl-debuginfo-0:7.12.1-17.el4.ppc", "4AS:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4AS:curl-debuginfo-0:7.12.1-17.el4.s390", "4AS:curl-debuginfo-0:7.12.1-17.el4.s390x", "4AS:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4AS:curl-devel-0:7.12.1-17.el4.i386", "4AS:curl-devel-0:7.12.1-17.el4.ia64", "4AS:curl-devel-0:7.12.1-17.el4.ppc", "4AS:curl-devel-0:7.12.1-17.el4.s390", "4AS:curl-devel-0:7.12.1-17.el4.s390x", "4AS:curl-devel-0:7.12.1-17.el4.x86_64", "4Desktop:curl-0:7.12.1-17.el4.i386", "4Desktop:curl-0:7.12.1-17.el4.ia64", "4Desktop:curl-0:7.12.1-17.el4.ppc", "4Desktop:curl-0:7.12.1-17.el4.ppc64", "4Desktop:curl-0:7.12.1-17.el4.s390", "4Desktop:curl-0:7.12.1-17.el4.s390x", "4Desktop:curl-0:7.12.1-17.el4.src", "4Desktop:curl-0:7.12.1-17.el4.x86_64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.i386", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ia64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ppc", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.s390", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.s390x", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4Desktop:curl-devel-0:7.12.1-17.el4.i386", "4Desktop:curl-devel-0:7.12.1-17.el4.ia64", "4Desktop:curl-devel-0:7.12.1-17.el4.ppc", "4Desktop:curl-devel-0:7.12.1-17.el4.s390", "4Desktop:curl-devel-0:7.12.1-17.el4.s390x", "4Desktop:curl-devel-0:7.12.1-17.el4.x86_64", "4ES:curl-0:7.12.1-17.el4.i386", "4ES:curl-0:7.12.1-17.el4.ia64", "4ES:curl-0:7.12.1-17.el4.ppc", "4ES:curl-0:7.12.1-17.el4.ppc64", "4ES:curl-0:7.12.1-17.el4.s390", "4ES:curl-0:7.12.1-17.el4.s390x", "4ES:curl-0:7.12.1-17.el4.src", "4ES:curl-0:7.12.1-17.el4.x86_64", "4ES:curl-debuginfo-0:7.12.1-17.el4.i386", "4ES:curl-debuginfo-0:7.12.1-17.el4.ia64", "4ES:curl-debuginfo-0:7.12.1-17.el4.ppc", "4ES:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4ES:curl-debuginfo-0:7.12.1-17.el4.s390", "4ES:curl-debuginfo-0:7.12.1-17.el4.s390x", "4ES:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4ES:curl-devel-0:7.12.1-17.el4.i386", "4ES:curl-devel-0:7.12.1-17.el4.ia64", "4ES:curl-devel-0:7.12.1-17.el4.ppc", "4ES:curl-devel-0:7.12.1-17.el4.s390", "4ES:curl-devel-0:7.12.1-17.el4.s390x", "4ES:curl-devel-0:7.12.1-17.el4.x86_64", "4WS:curl-0:7.12.1-17.el4.i386", "4WS:curl-0:7.12.1-17.el4.ia64", "4WS:curl-0:7.12.1-17.el4.ppc", "4WS:curl-0:7.12.1-17.el4.ppc64", "4WS:curl-0:7.12.1-17.el4.s390", "4WS:curl-0:7.12.1-17.el4.s390x", "4WS:curl-0:7.12.1-17.el4.src", "4WS:curl-0:7.12.1-17.el4.x86_64", "4WS:curl-debuginfo-0:7.12.1-17.el4.i386", "4WS:curl-debuginfo-0:7.12.1-17.el4.ia64", "4WS:curl-debuginfo-0:7.12.1-17.el4.ppc", "4WS:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4WS:curl-debuginfo-0:7.12.1-17.el4.s390", "4WS:curl-debuginfo-0:7.12.1-17.el4.s390x", "4WS:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4WS:curl-devel-0:7.12.1-17.el4.i386", "4WS:curl-devel-0:7.12.1-17.el4.ia64", "4WS:curl-devel-0:7.12.1-17.el4.ppc", "4WS:curl-devel-0:7.12.1-17.el4.s390", "4WS:curl-devel-0:7.12.1-17.el4.s390x", "4WS:curl-devel-0:7.12.1-17.el4.x86_64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.src", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.x86_64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.x86_64", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.src", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0918" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS:curl-0:7.12.1-17.el4.i386", "4AS:curl-0:7.12.1-17.el4.ia64", "4AS:curl-0:7.12.1-17.el4.ppc", "4AS:curl-0:7.12.1-17.el4.ppc64", "4AS:curl-0:7.12.1-17.el4.s390", "4AS:curl-0:7.12.1-17.el4.s390x", "4AS:curl-0:7.12.1-17.el4.src", "4AS:curl-0:7.12.1-17.el4.x86_64", "4AS:curl-debuginfo-0:7.12.1-17.el4.i386", "4AS:curl-debuginfo-0:7.12.1-17.el4.ia64", "4AS:curl-debuginfo-0:7.12.1-17.el4.ppc", "4AS:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4AS:curl-debuginfo-0:7.12.1-17.el4.s390", "4AS:curl-debuginfo-0:7.12.1-17.el4.s390x", "4AS:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4AS:curl-devel-0:7.12.1-17.el4.i386", "4AS:curl-devel-0:7.12.1-17.el4.ia64", "4AS:curl-devel-0:7.12.1-17.el4.ppc", "4AS:curl-devel-0:7.12.1-17.el4.s390", "4AS:curl-devel-0:7.12.1-17.el4.s390x", "4AS:curl-devel-0:7.12.1-17.el4.x86_64", "4Desktop:curl-0:7.12.1-17.el4.i386", "4Desktop:curl-0:7.12.1-17.el4.ia64", "4Desktop:curl-0:7.12.1-17.el4.ppc", "4Desktop:curl-0:7.12.1-17.el4.ppc64", "4Desktop:curl-0:7.12.1-17.el4.s390", "4Desktop:curl-0:7.12.1-17.el4.s390x", "4Desktop:curl-0:7.12.1-17.el4.src", "4Desktop:curl-0:7.12.1-17.el4.x86_64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.i386", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ia64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ppc", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.s390", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.s390x", "4Desktop:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4Desktop:curl-devel-0:7.12.1-17.el4.i386", "4Desktop:curl-devel-0:7.12.1-17.el4.ia64", "4Desktop:curl-devel-0:7.12.1-17.el4.ppc", "4Desktop:curl-devel-0:7.12.1-17.el4.s390", "4Desktop:curl-devel-0:7.12.1-17.el4.s390x", "4Desktop:curl-devel-0:7.12.1-17.el4.x86_64", "4ES:curl-0:7.12.1-17.el4.i386", "4ES:curl-0:7.12.1-17.el4.ia64", "4ES:curl-0:7.12.1-17.el4.ppc", "4ES:curl-0:7.12.1-17.el4.ppc64", "4ES:curl-0:7.12.1-17.el4.s390", "4ES:curl-0:7.12.1-17.el4.s390x", "4ES:curl-0:7.12.1-17.el4.src", "4ES:curl-0:7.12.1-17.el4.x86_64", "4ES:curl-debuginfo-0:7.12.1-17.el4.i386", "4ES:curl-debuginfo-0:7.12.1-17.el4.ia64", "4ES:curl-debuginfo-0:7.12.1-17.el4.ppc", "4ES:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4ES:curl-debuginfo-0:7.12.1-17.el4.s390", "4ES:curl-debuginfo-0:7.12.1-17.el4.s390x", "4ES:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4ES:curl-devel-0:7.12.1-17.el4.i386", "4ES:curl-devel-0:7.12.1-17.el4.ia64", "4ES:curl-devel-0:7.12.1-17.el4.ppc", "4ES:curl-devel-0:7.12.1-17.el4.s390", "4ES:curl-devel-0:7.12.1-17.el4.s390x", "4ES:curl-devel-0:7.12.1-17.el4.x86_64", "4WS:curl-0:7.12.1-17.el4.i386", "4WS:curl-0:7.12.1-17.el4.ia64", "4WS:curl-0:7.12.1-17.el4.ppc", "4WS:curl-0:7.12.1-17.el4.ppc64", "4WS:curl-0:7.12.1-17.el4.s390", "4WS:curl-0:7.12.1-17.el4.s390x", "4WS:curl-0:7.12.1-17.el4.src", "4WS:curl-0:7.12.1-17.el4.x86_64", "4WS:curl-debuginfo-0:7.12.1-17.el4.i386", "4WS:curl-debuginfo-0:7.12.1-17.el4.ia64", "4WS:curl-debuginfo-0:7.12.1-17.el4.ppc", "4WS:curl-debuginfo-0:7.12.1-17.el4.ppc64", "4WS:curl-debuginfo-0:7.12.1-17.el4.s390", "4WS:curl-debuginfo-0:7.12.1-17.el4.s390x", "4WS:curl-debuginfo-0:7.12.1-17.el4.x86_64", "4WS:curl-devel-0:7.12.1-17.el4.i386", "4WS:curl-devel-0:7.12.1-17.el4.ia64", "4WS:curl-devel-0:7.12.1-17.el4.ppc", "4WS:curl-devel-0:7.12.1-17.el4.s390", "4WS:curl-devel-0:7.12.1-17.el4.s390x", "4WS:curl-devel-0:7.12.1-17.el4.x86_64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.src", "5Server-5.6.Z:curl-0:7.15.5-9.el5_6.3.x86_64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-debuginfo-0:7.15.5-9.el5_6.3.x86_64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.i386", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ia64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ppc", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.ppc64", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.s390", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.s390x", "5Server-5.6.Z:curl-devel-0:7.15.5-9.el5_6.3.x86_64", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.src", "6Server-6.1.z:curl-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:curl-debuginfo-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:libcurl-0:7.19.7-26.el6_1.1.x86_64", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.i686", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.ppc", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.ppc64", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.s390", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.s390x", "6Server-6.1.z:libcurl-devel-0:7.19.7-26.el6_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Improper delegation of client credentials during GSS negotiation" } ] }
gsd-2011-2192
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-2192", "description": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.", "id": "GSD-2011-2192", "references": [ "https://www.suse.com/security/cve/CVE-2011-2192.html", "https://www.debian.org/security/2011/dsa-2271", "https://access.redhat.com/errata/RHSA-2011:0918", "https://linux.oracle.com/cve/CVE-2011-2192.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-2192" ], "details": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests.", "id": "GSD-2011-2192", "modified": "2023-12-13T01:19:07.057468Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2192", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "MISC", "url": "http://support.apple.com/kb/HT5130" }, { "name": "http://secunia.com/advisories/48256", "refsource": "MISC", "url": "http://secunia.com/advisories/48256" }, { "name": "http://security.gentoo.org/glsa/glsa-201203-02.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "http://curl.haxx.se/curl-gssapi-delegation.patch", "refsource": "MISC", "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "name": "http://curl.haxx.se/docs/adv_20110623.html", "refsource": "MISC", "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "name": "http://secunia.com/advisories/45047", "refsource": "MISC", "url": "http://secunia.com/advisories/45047" }, { "name": "http://secunia.com/advisories/45067", "refsource": "MISC", "url": "http://secunia.com/advisories/45067" }, { "name": "http://secunia.com/advisories/45088", "refsource": "MISC", "url": "http://secunia.com/advisories/45088" }, { "name": "http://secunia.com/advisories/45144", "refsource": "MISC", "url": "http://secunia.com/advisories/45144" }, { "name": "http://secunia.com/advisories/45181", "refsource": "MISC", "url": "http://secunia.com/advisories/45181" }, { "name": "http://www.debian.org/security/2011/dsa-2271", "refsource": "MISC", "url": "http://www.debian.org/security/2011/dsa-2271" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "name": "http://www.redhat.com/support/errata/RHSA-2011-0918.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "name": "http://www.securitytracker.com/id?1025713", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1025713" }, { "name": "http://www.ubuntu.com/usn/USN-1158-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1158-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=711454", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.21.6", "versionStartIncluding": "7.10.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.7.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2192" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSSAPI requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-255" } ] } ] }, "references": { "reference_data": [ { "name": "http://curl.haxx.se/curl-gssapi-delegation.patch", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://curl.haxx.se/curl-gssapi-delegation.patch" }, { "name": "http://curl.haxx.se/docs/adv_20110623.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://curl.haxx.se/docs/adv_20110623.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=711454", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454" }, { "name": "USN-1158-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1158-1" }, { "name": "RHSA-2011:0918", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0918.html" }, { "name": "45088", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45088" }, { "name": "45181", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45181" }, { "name": "45144", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45144" }, { "name": "DSA-2271", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2271" }, { "name": "FEDORA-2011-8586", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061992.html" }, { "name": "FEDORA-2011-8640", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062287.html" }, { "name": "1025713", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025713" }, { "name": "MDVSA-2011:116", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:116" }, { "name": "45067", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45067" }, { "name": "45047", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45047" }, { "name": "http://support.apple.com/kb/HT5130", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "APPLE-SA-2012-02-01-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "GLSA-201203-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201203-02.xml" }, { "name": "48256", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48256" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2020-05-27T20:42Z", "publishedDate": "2011-07-07T21:55Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.