fkie_cve-2006-3738
Vulnerability from fkie_nvd
Published
2006-09-28 18:07
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.
References
secalert@redhat.comftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
secalert@redhat.comhttp://docs.info.apple.com/article.html?artnum=304829
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
secalert@redhat.comhttp://issues.rpath.com/browse/RPL-613
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
secalert@redhat.comhttp://kolab.org/security/kolab-vendor-notice-11.txtPatch
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
secalert@redhat.comhttp://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.htmlPatch
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=130497311408250&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=130497311408250&w=2
secalert@redhat.comhttp://openbsd.org/errata.html#openssl2Patch
secalert@redhat.comhttp://openvpn.net/changelog.htmlPatch
secalert@redhat.comhttp://secunia.com/advisories/22094Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22116Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22130Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22165Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22166Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22172Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22186Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22193Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22207Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22212Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22216Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22220Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22240Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22259Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22260Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22284Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22298
secalert@redhat.comhttp://secunia.com/advisories/22330Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22385
secalert@redhat.comhttp://secunia.com/advisories/22460
secalert@redhat.comhttp://secunia.com/advisories/22487
secalert@redhat.comhttp://secunia.com/advisories/22500
secalert@redhat.comhttp://secunia.com/advisories/22544
secalert@redhat.comhttp://secunia.com/advisories/22626
secalert@redhat.comhttp://secunia.com/advisories/22633
secalert@redhat.comhttp://secunia.com/advisories/22654
secalert@redhat.comhttp://secunia.com/advisories/22758
secalert@redhat.comhttp://secunia.com/advisories/22772
secalert@redhat.comhttp://secunia.com/advisories/22791
secalert@redhat.comhttp://secunia.com/advisories/22799
secalert@redhat.comhttp://secunia.com/advisories/23038
secalert@redhat.comhttp://secunia.com/advisories/23155
secalert@redhat.comhttp://secunia.com/advisories/23280
secalert@redhat.comhttp://secunia.com/advisories/23309
secalert@redhat.comhttp://secunia.com/advisories/23340
secalert@redhat.comhttp://secunia.com/advisories/23680
secalert@redhat.comhttp://secunia.com/advisories/23794
secalert@redhat.comhttp://secunia.com/advisories/23915
secalert@redhat.comhttp://secunia.com/advisories/24930
secalert@redhat.comhttp://secunia.com/advisories/24950
secalert@redhat.comhttp://secunia.com/advisories/25889
secalert@redhat.comhttp://secunia.com/advisories/26329
secalert@redhat.comhttp://secunia.com/advisories/30124
secalert@redhat.comhttp://secunia.com/advisories/30161
secalert@redhat.comhttp://secunia.com/advisories/31492
secalert@redhat.comhttp://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.ascPatch, Vendor Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200610-11.xml
secalert@redhat.comhttp://securitytracker.com/id?1016943Patch
secalert@redhat.comhttp://securitytracker.com/id?1017522
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946Patch
secalert@redhat.comhttp://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1Patch
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
secalert@redhat.comhttp://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
secalert@redhat.comhttp://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1185Patch
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1195Patch, Vendor Advisory
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/547300US Government Resource
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:172
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:177
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:178
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2006_24_sr.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2006_58_openssl.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.openssl.org/news/secadv_20060928.txt
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
secalert@redhat.comhttp://www.osvdb.org/29262Patch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2006-0695.htmlPatch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0629.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/447318/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/447393/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/456546/100/200/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/470460/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/20249Patch
secalert@redhat.comhttp://www.securityfocus.com/bid/22083
secalert@redhat.comhttp://www.serv-u.com/releasenotes/
secalert@redhat.comhttp://www.trustix.org/errata/2006/0054Patch
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-353-1Patch
secalert@redhat.comhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlUS Government Resource
secalert@redhat.comhttp://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
secalert@redhat.comhttp://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
secalert@redhat.comhttp://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
secalert@redhat.comhttp://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
secalert@redhat.comhttp://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
secalert@redhat.comhttp://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/3820
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/3860
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/3869
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/3902
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/3936
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4036
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4264
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4314
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4401
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4417
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4443
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4750
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0343
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1401
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2315
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2783
secalert@redhat.comhttp://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
secalert@redhat.comhttp://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/29237
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370
secalert@redhat.comhttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
secalert@redhat.comhttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
secalert@redhat.comhttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=304829
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
af854a3a-2127-422b-91ae-364da2661108http://issues.rpath.com/browse/RPL-613
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
af854a3a-2127-422b-91ae-364da2661108http://kolab.org/security/kolab-vendor-notice-11.txtPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=130497311408250&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=130497311408250&w=2
af854a3a-2127-422b-91ae-364da2661108http://openbsd.org/errata.html#openssl2Patch
af854a3a-2127-422b-91ae-364da2661108http://openvpn.net/changelog.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22094Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22116Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22130Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22165Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22166Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22172Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22186Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22193Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22207Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22212Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22216Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22220Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22240Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22259Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22260Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22284Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22298
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22330Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22385
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22460
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22487
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22500
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22544
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22626
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22633
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22654
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22758
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22772
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22791
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22799
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23038
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23155
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23280
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23309
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23340
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23680
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23794
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23915
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24930
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24950
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25889
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26329
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30124
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30161
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31492
af854a3a-2127-422b-91ae-364da2661108http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.ascPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200610-11.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016943Patch
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017522
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946Patch
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1Patch
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1185Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1195Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/547300US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:172
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_24_sr.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_58_openssl.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openssl.org/news/secadv_20060928.txt
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/29262Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0695.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0629.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447318/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/447393/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/456546/100/200/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/470460/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/20249Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22083
af854a3a-2127-422b-91ae-364da2661108http://www.serv-u.com/releasenotes/
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0054Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-353-1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA06-333A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3820
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3860
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3869
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3902
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3936
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4036
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4264
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4314
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4401
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4417
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4443
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4750
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0343
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1401
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2315
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2783
af854a3a-2127-422b-91ae-364da2661108http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf
af854a3a-2127-422b-91ae-364da2661108http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/29237
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
af854a3a-2127-422b-91ae-364da2661108https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Impacted products
Vendor Product Version
openssl openssl 0.9.7
openssl openssl 0.9.7a
openssl openssl 0.9.7b
openssl openssl 0.9.7c
openssl openssl 0.9.7d
openssl openssl 0.9.7e
openssl openssl 0.9.7f
openssl openssl 0.9.7g
openssl openssl 0.9.7h
openssl openssl 0.9.7i
openssl openssl 0.9.7j
openssl openssl 0.9.7k
openssl openssl 0.9.8
openssl openssl 0.9.8a
openssl openssl 0.9.8b
openssl openssl 0.9.8c



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "45A518E8-21BE-4C5C-B425-410AB1208E9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
                     matchCriteriaId: "78E79A05-64F3-4397-952C-A5BB950C967D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
                     matchCriteriaId: "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DE6CBD6-D6DD-4BC5-93F6-FDEA70163336",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*",
                     matchCriteriaId: "98693865-2E79-4BD6-9F89-1994BC9A3E73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6476506-EC37-4726-82DC-D0E8254A8CDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D6ECEF7-CB16-4604-894B-6EB19F1CEF55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C81EF3D-4DB7-4799-9670-8D79E28CA184",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8116A66-175C-4E6D-9A9B-D54C1D97D213",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*",
                     matchCriteriaId: "382C1679-DA1D-4FA4-9D5E-B86CC5052D49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CA28812-8A24-4FE1-BED9-D6D5BB023645",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A4E446D-B9D3-45F2-9722-B41FA14A6C31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF4EA988-FC80-4170-8933-7C6663731981",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
                     matchCriteriaId: "64F8F53B-24A1-4877-B16E-F1917C4E4E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
                     matchCriteriaId: "75D3ACD5-905F-42BB-BE1A-8382E9D823BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en la función SSL_get_shared_ciphers en OpenSSL 0.9.7 anterior a 0.9.7l, 0.9.8 anterior a 0.9.8d, y versiones anteriores tiene impacto y vectores de ataque no especificados implicando una lista de cifras larga.",
      },
   ],
   evaluatorSolution: "Failed exploit attempts may crash applications, denying service to legitimate users.",
   id: "CVE-2006-3738",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-09-28T18:07:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc",
      },
      {
         source: "secalert@redhat.com",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc",
      },
      {
         source: "secalert@redhat.com",
         url: "http://docs.info.apple.com/article.html?artnum=304829",
      },
      {
         source: "secalert@redhat.com",
         url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771",
      },
      {
         source: "secalert@redhat.com",
         url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771",
      },
      {
         source: "secalert@redhat.com",
         url: "http://issues.rpath.com/browse/RPL-613",
      },
      {
         source: "secalert@redhat.com",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100",
      },
      {
         source: "secalert@redhat.com",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100",
      },
      {
         source: "secalert@redhat.com",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540",
      },
      {
         source: "secalert@redhat.com",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://kolab.org/security/kolab-vendor-notice-11.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://marc.info/?l=bugtraq&m=130497311408250&w=2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://marc.info/?l=bugtraq&m=130497311408250&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openbsd.org/errata.html#openssl2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openvpn.net/changelog.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22094",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22116",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22130",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22165",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22166",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22172",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22186",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22193",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22207",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22212",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22216",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22220",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22240",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22259",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22260",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22284",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22298",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22330",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22385",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22460",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22487",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22500",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22544",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22626",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22633",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22654",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22758",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22772",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22791",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22799",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23038",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23155",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23280",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23309",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23340",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23680",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23794",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23915",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24930",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/24950",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/25889",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/26329",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/30124",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/30161",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/31492",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200610-11.xml",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://securitytracker.com/id?1016943",
      },
      {
         source: "secalert@redhat.com",
         url: "http://securitytracker.com/id?1017522",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.debian.org/security/2006/dsa-1185",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-1195",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/547300",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:172",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2006_24_sr.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2006_58_openssl.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openssl.org/news/secadv_20060928.txt",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.osvdb.org/29262",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0695.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/447318/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/447393/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/456546/100/200/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/470460/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/20249",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/22083",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.serv-u.com/releasenotes/",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.trustix.org/errata/2006/0054",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-353-1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA06-333A.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/3820",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/3860",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/3869",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/3902",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/3936",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4036",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4264",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4314",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4401",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4417",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4443",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4750",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/0343",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/1401",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/2315",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2007/2783",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/29237",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-007.txt.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://docs.info.apple.com/article.html?artnum=304829",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://issues.rpath.com/browse/RPL-613",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://kolab.org/security/kolab-vendor-notice-11.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049715.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=130497311408250&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=130497311408250&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openbsd.org/errata.html#openssl2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openvpn.net/changelog.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22094",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22116",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22130",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22165",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22166",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22172",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22186",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22193",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22207",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22212",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22216",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22240",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22259",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22260",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22284",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22298",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22330",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22385",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22460",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22487",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22500",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22544",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22626",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22633",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22654",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22758",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22772",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22791",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22799",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23038",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23155",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23280",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23309",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23340",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23680",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23794",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23915",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24930",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24950",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25889",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26329",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30124",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/31492",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200610-11.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://securitytracker.com/id?1016943",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1017522",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.676946",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sourceforge.net/project/shownotes.php?release_id=461863&group_id=69227",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102711-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201531-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2006-220.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.debian.org/security/2006/dsa-1185",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-1195",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200612-11.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/547300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:172",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2006_24_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2006_58_openssl.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.021-openssl.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openssl.org/news/secadv_20060928.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.osvdb.org/29262",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2006-0695.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/447318/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/447393/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/456546/100/200/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/470460/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/20249",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/22083",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.serv-u.com/releasenotes/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.trustix.org/errata/2006/0054",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.ubuntu.com/usn/usn-353-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA06-333A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/3820",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/3860",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/3869",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/3902",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/3936",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4036",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4264",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4314",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4401",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4417",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4443",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4750",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/0343",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/1401",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/2315",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/2783",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.xerox.com/downloads/usa/en/c/cert_ESSNetwork_XRX07001_v1.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=498093&RenditionID=&poid=8881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/29237",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4256",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9370",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vendorComments: [
      {
         comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
         lastModified: "2007-03-14T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.