gsd-2004-0079
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2004-0079",
    "description": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.",
    "id": "GSD-2004-0079",
    "references": [
      "https://www.suse.com/security/cve/CVE-2004-0079.html",
      "https://www.debian.org/security/2004/dsa-465",
      "https://access.redhat.com/errata/RHSA-2005:830",
      "https://access.redhat.com/errata/RHSA-2005:829",
      "https://access.redhat.com/errata/RHSA-2004:139",
      "https://access.redhat.com/errata/RHSA-2004:121",
      "https://access.redhat.com/errata/RHSA-2004:120"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2004-0079"
      ],
      "details": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.",
      "id": "GSD-2004-0079",
      "modified": "2023-12-13T01:22:54.859417Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2004-0079",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "9899",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/9899"
          },
          {
            "name": "FEDORA-2005-1042",
            "refsource": "FEDORA",
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html"
          },
          {
            "name": "ESA-20040317-003",
            "refsource": "ENGARDE",
            "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html"
          },
          {
            "name": "SSRT4717",
            "refsource": "HP",
            "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2"
          },
          {
            "name": "RHSA-2004:121",
            "refsource": "REDHAT",
            "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html"
          },
          {
            "name": "MDKSA-2004:023",
            "refsource": "MANDRAKE",
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023"
          },
          {
            "name": "oval:org.mitre.oval:def:2621",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621"
          },
          {
            "name": "CLA-2004:834",
            "refsource": "CONECTIVA",
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834"
          },
          {
            "name": "SCOSA-2004.10",
            "refsource": "SCO",
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt"
          },
          {
            "name": "17381",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/17381"
          },
          {
            "name": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
            "refsource": "MISC",
            "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm"
          },
          {
            "name": "FEDORA-2004-095",
            "refsource": "FEDORA",
            "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml"
          },
          {
            "name": "oval:org.mitre.oval:def:9779",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779"
          },
          {
            "name": "oval:org.mitre.oval:def:975",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975"
          },
          {
            "name": "57524",
            "refsource": "SUNALERT",
            "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524"
          },
          {
            "name": "SuSE-SA:2004:007",
            "refsource": "SUSE",
            "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html"
          },
          {
            "name": "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
            "refsource": "CONFIRM",
            "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html"
          },
          {
            "name": "http://www.openssl.org/news/secadv_20040317.txt",
            "refsource": "CONFIRM",
            "url": "http://www.openssl.org/news/secadv_20040317.txt"
          },
          {
            "name": "FreeBSD-SA-04:05",
            "refsource": "FREEBSD",
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc"
          },
          {
            "name": "NetBSD-SA2004-005",
            "refsource": "NETBSD",
            "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc"
          },
          {
            "name": "O-101",
            "refsource": "CIAC",
            "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml"
          },
          {
            "name": "TA04-078A",
            "refsource": "CERT",
            "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html"
          },
          {
            "name": "17401",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/17401"
          },
          {
            "name": "RHSA-2005:829",
            "refsource": "REDHAT",
            "url": "http://www.redhat.com/support/errata/RHSA-2005-829.html"
          },
          {
            "name": "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm",
            "refsource": "CONFIRM",
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm"
          },
          {
            "name": "oval:org.mitre.oval:def:870",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870"
          },
          {
            "name": "RHSA-2005:830",
            "refsource": "REDHAT",
            "url": "http://www.redhat.com/support/errata/RHSA-2005-830.html"
          },
          {
            "name": "GLSA-200403-03",
            "refsource": "GENTOO",
            "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml"
          },
          {
            "name": "11139",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/11139"
          },
          {
            "name": "RHSA-2004:120",
            "refsource": "REDHAT",
            "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html"
          },
          {
            "name": "20040317 New OpenSSL releases fix denial of service attacks [17 March 2004]",
            "refsource": "BUGTRAQ",
            "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2"
          },
          {
            "name": "http://support.lexmark.com/index?page=content\u0026id=TE88\u0026locale=EN\u0026userlocale=EN_US",
            "refsource": "CONFIRM",
            "url": "http://support.lexmark.com/index?page=content\u0026id=TE88\u0026locale=EN\u0026userlocale=EN_US"
          },
          {
            "name": "APPLE-SA-2005-08-15",
            "refsource": "APPLE",
            "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
          },
          {
            "name": "17398",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/17398"
          },
          {
            "name": "SSA:2004-077",
            "refsource": "SLACKWARE",
            "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961"
          },
          {
            "name": "RHSA-2004:139",
            "refsource": "REDHAT",
            "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html"
          },
          {
            "name": "openssl-dochangecipherspec-dos(15505)",
            "refsource": "XF",
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505"
          },
          {
            "name": "2004-0012",
            "refsource": "TRUSTIX",
            "url": "http://www.trustix.org/errata/2004/0012"
          },
          {
            "name": "20040317 Cisco OpenSSL Implementation Vulnerability",
            "refsource": "CISCO",
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml"
          },
          {
            "name": "http://docs.info.apple.com/article.html?artnum=61798",
            "refsource": "CONFIRM",
            "url": "http://docs.info.apple.com/article.html?artnum=61798"
          },
          {
            "name": "VU#288574",
            "refsource": "CERT-VN",
            "url": "http://www.kb.cert.org/vuls/id/288574"
          },
          {
            "name": "DSA-465",
            "refsource": "DEBIAN",
            "url": "http://www.debian.org/security/2004/dsa-465"
          },
          {
            "name": "APPLE-SA-2005-08-17",
            "refsource": "APPLE",
            "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
          },
          {
            "name": "18247",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/18247"
          },
          {
            "name": "oval:org.mitre.oval:def:5770",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B9CAFC15-178C-4176-9668-D4A04B63E77B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3C8D6949-89F4-40EF-98F4-8D15628DC345",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "6479D85C-1A12-486D-818C-6679F415CA26",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "287CF5FA-D0EC-4FD7-9718-973587EF34DF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C88168D4-7DB5-4720-8640-400BB680D0FD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*",
                    "matchCriteriaId": "968915A1-375B-4C69-BE11-9A393F7F1B0F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "11465DCA-72E5-40E9-9D8E-B3CD470C47E9",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3954D0D1-9FDF-47D0-9710-D0FB06955B8B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3D6712BD-DE8F-40F5-AC74-B9EFE9A50CFA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E586558A-ABC3-42EB-8B4D-DC92A0D695E6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2A4C5F60-B32D-4D85-BA28-AE11972ED614",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6A5935C3-3D83-461F-BC26-E03362115C42",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "80AC523B-3106-46F2-B760-803DCF8061F4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F8B8D6F3-D15D-489F-A807-17E63F4831F2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "808189BA-197F-49CE-933E-A728F395749C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "32DCFA7B-7BBB-465A-A4AD-7E18EE3C02DC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CC7EF0CD-EA39-457B-8E2E-9120B65A5835",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7BC2983F-5212-464B-AC21-8A897DEC1F58",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EBF17989-D1F2-4B04-80BD-CFABDD482ABA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BF2D00AC-FA2A-4C39-B796-DC19072862CF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                    "matchCriteriaId": "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                    "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                    "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                    "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                    "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
                    "matchCriteriaId": "31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
                    "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
                    "matchCriteriaId": "32310AFE-38CC-4C6C-AE13-54C18720F2C0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AC46909F-DDFC-448B-BCDF-1EB343F96630",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9496279F-AB43-4B53-81A6-87C651ABC4BA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
                    "matchCriteriaId": "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                    "matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
                    "matchCriteriaId": "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E562907F-D915-4030-847A-3C6834A80D4E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "138985E6-5107-4E8B-A801-C3D5FE075227",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1E140F76-D078-4F58-89CF-3278CDCB9AF3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D9D76A8D-832B-411E-A458-186733C66010",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "580BA1FE-0826-47A7-8BD3-9225E0841EDD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "040B04CD-B891-4F19-A7CC-5C2D462FBD6C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5BF29685-7FFC-4093-A1D4-21E4871AF5C6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E72872C9-63AF-417F-BFAE-92B4D350C006",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
                    "matchCriteriaId": "80BCF196-5E5A-4F31-BCE7-AA0C748CA922",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "970939C5-1E6F-47B6-97E6-7B2C1E019985",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CD1F4148-E772-4708-8C1F-D67F969C11DA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3CEBCEF0-5982-4B30-8377-9CAC978A1CB0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
                    "matchCriteriaId": "09458CD7-D430-4957-8506-FAB2A3E2AA65",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
                    "matchCriteriaId": "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F8B87C95-4B34-4628-AD03-67D1DE13E097",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "758F95DB-E619-4B08-86FA-6CF2C1B0CBCD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4F04471C-732F-44EE-AD1B-6305C1DD7DDD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3499913B-5DCD-4115-8C7B-9E8AFF79DE5E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E237919A-416B-4039-AAD2-7FAE1F4E100D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "39149924-188C-40C1-B598-A9CD407C90DE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "15D5780C-4E29-4BCA-A47E-29FF6EAF33FC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E6501108-5455-48FE-AA82-37AFA5D7EC24",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",
                    "matchCriteriaId": "C1A3B951-A1F8-4291-82FA-AB7922D13ACE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3F2E7C81-C0F5-4D36-9A23-03BE69295ED0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9D0EF4A3-2FE5-41E4-A764-30B379ECF081",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CCF6D59E-8AEA-4380-B86B-0803B2202F16",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "140ABF28-FA39-4D77-AEB2-304962ED48C2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*",
                    "matchCriteriaId": "09473DD9-5114-44C5-B56C-6630FBEBCACB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A7ECD3A4-5A39-4222-8350-524F11D8FFB0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D36C140D-E80C-479A-ADA7-18E901549059",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "940712E9-B041-4B7F-BD02-7DD0AE596D65",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "03B887A2-9025-4C5B-8901-71BC63BF5293",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "33264586-7160-4550-9FF9-4101D72F5C9B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CE5E6521-0611-4473-82AC-21655F10FEC0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*",
                    "matchCriteriaId": "AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*",
                    "matchCriteriaId": "8C83ABA2-87CD-429B-9800-590F8256B064",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A4D9A576-2878-4AC4-AC95-E69CB8A84A71",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0A1A0B02-CF33-401F-9AB2-D595E586C795",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8C0EF3F0-B82E-45B7-8D05-05E76009F7A2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "90FB3825-21A6-4DBE-8188-67672DBE01CB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*",
                    "matchCriteriaId": "80623E58-8B46-4559-89A4-C329AACF3CB7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*",
                    "matchCriteriaId": "AEE6C228-CD93-4636-868B-C19BC1674BE6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*",
                    "matchCriteriaId": "A645148C-AD0D-46C1-BEE3-10F5C9066279",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*",
                    "matchCriteriaId": "0D69187C-7F46-4FF0-A8A0-0E1989EA79BC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4AE4A7EE-1BA3-46F1-BF4A-A72997EE0992",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "02029D75-FAF2-4842-9246-079C7DE36417",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E0146341-364C-4085-A2E1-BC8C260FBA3D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B8496E0D-2507-4C25-A122-0B846CBCA72A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8E383F2A-DFCF-47F8-94EE-3563D41EA597",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D2D87EF0-056E-4128-89EB-2803ED83DEE9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BB3163C1-2044-44DA-9C88-076D75FDF1EB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "07E1B690-C58B-4C08-A757-F3DF451FDAAA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "31F0E14C-7681-4D1A-B982-A51E450B93A7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*",
                    "matchCriteriaId": "ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2CF39E8B-C201-4940-81C9-14AF4C3DD4B5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AC604680-2E9E-4DC4-ACDD-74D552A45BA4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "37A94436-D092-4C7E-B87B-63BC621EE82E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*",
                    "matchCriteriaId": "862165CF-3CFB-4C6E-8238-86FA85F243C8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*",
                    "matchCriteriaId": "056F3336-BAA8-4A03-90B4-7B31710FC1B3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9FDC2510-FBB9-429A-B6D4-10AB11F93960",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5D45127E-A544-40A0-9D34-BD70D95C9772",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "56C69C3E-C895-45C8-8182-7BB412A0C828",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A1FDD507-C38B-4C38-A54F-3DA6F07AD0B5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6F2B7AC2-CF08-4AC9-9A71-3A8130F9F9AD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D4D9564B-B92E-4C97-87FF-B56D62DCA775",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B931D4F8-23F5-4ABA-A457-959995D30C58",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BE6A023E-9C2A-487F-B5CE-674C766BFE75",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6A15ACA2-D500-4260-B51A-6FE6AB5A45A4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2A045971-8756-47E8-9044-C39D08B36F1F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CAA95881-7231-4FDA-AF73-04DF9FF0B64C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "62B7F6AD-EDBD-4B09-BDB2-795ED114F2AE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F045AB7B-1551-46E5-A5CC-BF13C1BB49F4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "44E85930-3AAD-420B-8E3E-AEC57344F6C4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "52FD4485-BCA2-485A-A0CF-F8152C9DBFA5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7CF53BE4-FE2D-4D63-BD0F-A423D0FE3BE3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "00993464-BE09-4691-B3F0-51BBA9FB80C3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "896AB39E-2078-4BA2-9522-477BD5F98FD1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EB9279EC-47CF-45F1-B4CC-B2B332E82E34",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E7300C3E-8105-4C23-89B9-7D29CED18C15",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "90C59DB2-48DA-4172-A1F5-25CF3B5097AE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "715F4E0B-7E4B-4520-A987-9B3ED3136B75",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9CA1F606-C558-40FD-9300-6E2796F47BA8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A037FAA6-6D26-4496-BC67-03475B4D1155",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D3831DD3-E783-4200-8986-FDBF7DD9BA53",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "699764B6-0F86-4AB0-86A3-4F2E69AD820C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7562ADC4-0D01-4FC2-98F0-1F4041BDA52E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E6FAB588-BDBE-4A04-AB9E-4F700A3951F0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E1B83F84-D1EF-43B4-8620-3C1BCCE44553",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*",
                    "matchCriteriaId": "41169D2F-4F16-466A-82E9-AD0735472B5B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "947699C3-D9DE-411A-99C0-44ADD1D2223A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "15F668C0-8420-4401-AB0F-479575596CF0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CDDCC7B6-34CA-4551-9833-306B93E517BD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*",
                    "matchCriteriaId": "6D69C160-39F7-48B8-B9A3-CC86690453C0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "166BF638-ABDC-4BB9-BD4E-2B22681AD9CC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8FA6420B-9F6A-48F4-A445-12B60A320347",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "180D07AE-C571-4DD6-837C-43E2A946007A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
                    "matchCriteriaId": "90789533-C741-4B1C-A24B-2C77B9E4DE5F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1520065B-46D7-48A4-B9D0-5B49F690C5B4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
                    "matchCriteriaId": "494E48E7-EF86-4860-9A53-94F6C313746E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
                    "matchCriteriaId": "9E3AB748-E463-445C-ABAB-4FEDDFD1878B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
                    "matchCriteriaId": "660E4B8D-AABA-4520-BC4D-CF8E76E07C05",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
                    "matchCriteriaId": "85BFEED5-4941-41BB-93D1-CD5C2A41290E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "78E79A05-64F3-4397-952C-A5BB950C967D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
                    "matchCriteriaId": "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*",
                    "matchCriteriaId": "09F3FB7B-0F68-49F3-A3B7-977A687A42E2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*",
                    "matchCriteriaId": "088F2FF7-96E5-455E-A35B-D99F9854EC6E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*",
                    "matchCriteriaId": "FFA721BF-1B2E-479F-BF25-02D441BF175B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*",
                    "matchCriteriaId": "AFEDCE49-21CC-4168-818F-4C638EE3B077",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*",
                    "matchCriteriaId": "B7D18F9B-C0BE-4DE8-81F4-5BF56C00BF41",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "26430687-409B-448F-934B-06AB937DDF63",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "29DC217F-C257-4A3C-9CBD-08010C30BEC3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8F0F78F4-E81E-4C6B-AB73-D6AAE191060E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DF1A5808-6D5D-48AD-9470-5A6510D17913",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C1E8990D-D9A0-4A71-9D87-EC047E01B0D8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6DBCC172-6867-4DFD-AAEF-9BDB4DA21F46",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C2F2BEEA-46BB-4718-B0F3-B4EC62B678A6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8D09E11C-C5BB-409E-BB0D-7F351250419B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6B06A05D-AA31-441D-9FC2-3558648C3B7E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C0886901-6F93-44C1-B774-84D7E5D9554C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3F203A80-7C1E-4A04-8E99-63525E176753",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CA0A204C-158B-4014-A53C-75E0CD63E0DE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "085BA581-7DA5-4FA4-A888-351281FD0A7D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EA1C4B3C-5701-4233-BA94-28915713F9C8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*",
                    "matchCriteriaId": "28D9F8D7-698A-486A-918A-7DB5CAFBB3CB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D125C2A0-A4B5-48D6-A38A-54755C3FDF4C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0F85F672-0F21-4AD7-8620-13D82F2ECC22",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "89070041-613A-4F7B-BD6A-C6091D21FC52",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D9A71933-4BD5-4B11-8B14-D997E75F29CD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5B6BE11D-FC02-4950-A554-08CC9D8B1853",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A53FD0E1-9BAA-43F0-BCC9-0BE8D4356F55",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B80ADAE8-94D4-46A4-A5ED-FF134D808B52",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "69FA0221-5073-4D45-950F-119497B53FED",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C4AE5B43-7C90-4C2A-A215-30F5EC5841C9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2CC1A110-B203-4962-8E1A-74BD98121AF6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B5A92C4D-B024-4D39-9479-409C39586F64",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E7E0C4F5-CF02-4FF6-AE9B-5B6B70D5C067",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5E8998CC-E372-46D0-8339-47DC8D92D253",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AF131FDC-BF8D-4A17-99F0-444EB900E83D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "880811B3-E78E-456E-972E-DE733F368576",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "22411F18-2B93-405A-A3B5-2CF0A04977C6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C71188B7-E6DC-41E5-B619-367341113501",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "07491444-0196-4504-A971-A5E388B86BBA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "72BC6CD2-3291-4E69-8DC6-F3AB853F8931",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CD43EDDF-58A7-4705-B8C7-FD76C35A437D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A7C2E603-568F-40F6-9A7C-439E2A51B37F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*",
                    "matchCriteriaId": "703421A7-E8C5-450B-97EF-FD9D99D4B834",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9519BCB2-B401-44CE-97F6-847BB36AE45F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BBE573E8-DD94-4293-99AE-27B9067B3ED9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D14413DA-5199-4282-9E22-D347E9D8E469",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "05CC5F49-0E9E-45D8-827D-A5940566DB25",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5D94EE19-6CE9-4E02-8174-D9954CDBF02B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D4E4BEE3-AE7B-4481-B724-2E644E18ACC3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EAAB7052-E0B6-472E-920B-A0F0AEA25D6A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8CE38F15-BD42-4171-8670-86AA8169A60C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "20C0BD87-CE4B-49D2-89BE-EF282C43AD72",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C3E6C4A8-59F4-43EE-8413-E95289037598",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FE76357A-27E6-4D85-9AA0-1BB658C41568",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C56C5FDB-24E2-479D-87CA-164CD28567D3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1B6CFEC9-0F8F-4CD4-ABD1-E6533F910F7F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "12DE5E22-DF93-46BE-85A3-D4E04379E901",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BF28C435-C036-4507-8E3F-44E722F9974A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CDA957E2-ABF9-49B2-874F-3FC3060CE0B0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5F2CDFE7-6853-4A31-85C0-50C57A8D606A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*",
                    "matchCriteriaId": "408A9DB0-81EF-4186-B338-44954E67289B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5B0C5F92-7E93-4C3F-B22B-E6612A4D3E10",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2D0DC4B4-9AD9-4AC8-BFA7-A3D209B5D089",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*",
                    "matchCriteriaId": "303362A5-9C3C-4C85-8C97-2AB12CE01BF6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FED22DC1-E06B-4511-B920-6DAB792262D8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4CE44CA7-4BC7-4C2B-948F-2ACABB91528B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F757B2A7-869F-4702-81EB-466317A79D61",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*",
                    "matchCriteriaId": "01F6E9A9-6C85-48DA-BC61-55F8EACCB59F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "64AF1E33-4086-43E2-8F54-DA75A99D4B75",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*",
                    "matchCriteriaId": "53D16F03-A4C7-4497-AB74-499F208FF059",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*",
                    "matchCriteriaId": "13A33EC1-836B-4C8C-AC18-B5BD4F90E612",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "C558CED8-8342-46CB-9F52-580B626D320E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "0F85D19E-6C26-429D-B876-F34238B9DAAF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "09063867-0E64-4630-B35B-4CCA348E4DAB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "78F98CD7-A352-483C-9968-8FB2627A7CBD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "F97FE485-705F-4707-B6C6-0EF9E8A85D5F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "E2B925E8-D2C2-4E8C-AC21-0C422245C482",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "B9170562-872E-4C32-869C-B10FF35A925E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "D0927A68-8BB2-4F03-8396-E9CACC158FC0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "559DDBA3-2AF4-4A0C-B219-6779BA931F21",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "5226C9CC-6933-4F10-B426-B47782C606FD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "757DAE9A-B25D-4B8A-A41B-66C2897B537E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "5E3DC170-E279-4725-B9EE-6840B5685CC9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "8091EDA9-BD18-47F7-8CEC-E086238647C6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6F867890-74A4-4892-B99A-27DB4603B873",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "CE05B514-F094-4632-B25B-973F976F6409",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "3392428D-1A85-4472-A276-C482A78E2CE1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "40954985-16E6-4F37-B014-6A55166AE093",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*",
                    "matchCriteriaId": "0C097809-1FEF-4417-A201-42291CC29122",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference."
          },
          {
            "lang": "es",
            "value": "La funci\u00f3n  do_change_cipher_spec en OpenSSL  0.9.6c hasta 0.9.6.k y 0.9.7a hasta 0.9.7c permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (ca\u00edda) mediante una h\u00e1bil uni\u00f3n SSL/TLS que provoca un puntero nulo."
          }
        ],
        "id": "CVE-2004-0079",
        "lastModified": "2023-12-28T15:33:29.973",
        "metrics": {
          "cvssMetricV2": [
            {
              "acInsufInfo": false,
              "baseSeverity": "MEDIUM",
              "cvssData": {
                "accessComplexity": "LOW",
                "accessVector": "NETWORK",
                "authentication": "NONE",
                "availabilityImpact": "PARTIAL",
                "baseScore": 5.0,
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                "version": "2.0"
              },
              "exploitabilityScore": 10.0,
              "impactScore": 2.9,
              "obtainAllPrivilege": false,
              "obtainOtherPrivilege": false,
              "obtainUserPrivilege": false,
              "source": "nvd@nist.gov",
              "type": "Primary",
              "userInteractionRequired": false
            }
          ],
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 7.5,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 3.6,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2004-11-23T05:00:00.000",
        "references": [
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=61798"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Mailing List"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Mailing List"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Mailing List"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Mailing List"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://secunia.com/advisories/11139"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://secunia.com/advisories/17381"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://secunia.com/advisories/17398"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://secunia.com/advisories/17401"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://secunia.com/advisories/18247"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://support.lexmark.com/index?page=content\u0026id=TE88\u0026locale=EN\u0026userlocale=EN_US"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://www.debian.org/security/2004/dsa-465"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory",
              "US Government Resource"
            ],
            "url": "http://www.kb.cert.org/vuls/id/288574"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://www.openssl.org/news/secadv_20040317.txt"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Mailing List"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-829.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-830.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link",
              "Third Party Advisory",
              "VDB Entry",
              "Vendor Advisory"
            ],
            "url": "http://www.securityfocus.com/bid/9899"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.trustix.org/errata/2004/0012"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link",
              "Third Party Advisory",
              "US Government Resource"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975"
          },
          {
            "source": "cve@mitre.org",
            "tags": [
              "Broken Link"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779"
          }
        ],
        "sourceIdentifier": "cve@mitre.org",
        "vendorComments": [
          {
            "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
            "lastModified": "2007-03-14T00:00:00",
            "organization": "Red Hat"
          }
        ],
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-476"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.