RHSA-2010_0602

Vulnerability from csaf_redhat - Published: 2010-08-04 21:30 - Updated: 2024-12-15 18:14
Summary
Red Hat Security Advisory: Red Hat Certificate System 7.3 security update
Severity
Moderate
Notes
Topic: Updated packages that fix multiple security issues and rebase various components are now available for Red Hat Certificate System 7.3. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details: Red Hat Certificate System (RHCS) is an enterprise software system designed to manage enterprise Public Key Infrastructure (PKI) deployments. Multiple buffer overflow flaws were discovered in the way the pcscd daemon, a resource manager that coordinates communications with smart card readers and smart cards connected to the system, handled client requests. A local user could create a specially-crafted request that would cause the pcscd daemon to crash or, possibly, execute arbitrary code. (CVE-2010-0407, CVE-2009-4901) This erratum updates the Tomcat component shipped as part of Red Hat Certificate System to version 5.5.23, to address multiple security issues. In a typical operating environment, Tomcat is not exposed to users of Certificate System in a vulnerable manner. These security updates will reduce risk in unique Certificate System environments. (CVE-2005-2090, CVE-2005-3510, CVE-2006-3835, CVE-2007-0450, CVE-2007-1358, CVE-2007-3382, CVE-2007-3385, CVE-2007-5461, CVE-2007-5333, CVE-2008-0128, CVE-2008-1232, CVE-2008-2370, CVE-2008-5515, CVE-2009-0033, CVE-2009-0580) This erratum provides updated versions of the following components, required by the updated Tomcat version: ant, avalon-logkit, axis, classpathx-jaf, classpathx-mail, geronimo-specs, jakarta-commons-modeler, log4j, mx4j, xerces-j2, and xml-commons. A number of components have been updated to fix security issues for users of Red Hat Certificate System for the Solaris operating system. These fixes are for apr issue CVE-2009-2412; apr-util issues CVE-2009-0023, CVE-2009-1955, CVE-2009-1956, and CVE-2009-2412; httpd issues CVE-2006-3918, CVE-2006-5752, CVE-2007-1863, CVE-2007-3304, CVE-2007-3847, CVE-2007-4465, CVE-2007-5000, CVE-2007-6388, CVE-2008-0005, CVE-2008-2364, CVE-2008-2939, CVE-2009-1891, CVE-2009-3094, CVE-2009-3095, and CVE-2010-0434; mod_perl issue CVE-2007-1349; and perl issues CVE-2007-5116 and CVE-2008-1927. Note: Updated apr, apr-util, httpd, mod_perl, and perl packages were previously available to users of Red Hat Certificate System for Red Hat Enterprise Linux via the Red Hat Enterprise Linux 4 channels on the Red Hat Network. Additionally, the rhpki-ca, rhpki-kra, rhpki-ocsp, rhpki-tks, rhpki-java-tools, and rhpki-native-tools packages were updated to address some anomalous behavior on the Solaris operating system. (BZ#600513, BZ#605760) As well, this update provides an updated rhpki-manage package, which includes installation and uninstall scripts for Red Hat Certificate System that have been updated with the list of packages required by the Tomcat component, and an updated dependency on the NSS and NSPR packages. All users of Red Hat Certificate System are advised to upgrade to these updated packages, which correct these issues. Refer to the Red Hat Certificate System Administration Guide, linked to in the References, for details on how to install the updated packages on the Solaris operating system. After installing this update, all Red Hat Certificate System subsystems must be restarted ("/etc/init.d/[instance-name] restart") for the update to take effect.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.

CWE-125 - Out-of-bounds Read
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.

CWE-190 - Integer Overflow or Wraparound
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Moderate

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low

The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.

CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.

CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Important

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.

Affected products
Product Identifier Version Remediation
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src
Vendor Fix fix
Unresolved product id: 4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch
Vendor Fix fix
Threats
Impact Low
References
URL Category
https://access.redhat.com/errata/RHSA-2010:0602 self
http://www.redhat.com/security/updates/classifica… external
http://www.redhat.com/docs/manuals/cert-system/7.… external
https://bugzilla.redhat.com/show_bug.cgi?id=200732 external
https://bugzilla.redhat.com/show_bug.cgi?id=237079 external
https://bugzilla.redhat.com/show_bug.cgi?id=237080 external
https://bugzilla.redhat.com/show_bug.cgi?id=237084 external
https://bugzilla.redhat.com/show_bug.cgi?id=237085 external
https://bugzilla.redhat.com/show_bug.cgi?id=240423 external
https://bugzilla.redhat.com/show_bug.cgi?id=244658 external
https://bugzilla.redhat.com/show_bug.cgi?id=244803 external
https://bugzilla.redhat.com/show_bug.cgi?id=245111 external
https://bugzilla.redhat.com/show_bug.cgi?id=245112 external
https://bugzilla.redhat.com/show_bug.cgi?id=247972 external
https://bugzilla.redhat.com/show_bug.cgi?id=247976 external
https://bugzilla.redhat.com/show_bug.cgi?id=250731 external
https://bugzilla.redhat.com/show_bug.cgi?id=289511 external
https://bugzilla.redhat.com/show_bug.cgi?id=323571 external
https://bugzilla.redhat.com/show_bug.cgi?id=333791 external
https://bugzilla.redhat.com/show_bug.cgi?id=419931 external
https://bugzilla.redhat.com/show_bug.cgi?id=427228 external
https://bugzilla.redhat.com/show_bug.cgi?id=427739 external
https://bugzilla.redhat.com/show_bug.cgi?id=427766 external
https://bugzilla.redhat.com/show_bug.cgi?id=429821 external
https://bugzilla.redhat.com/show_bug.cgi?id=443928 external
https://bugzilla.redhat.com/show_bug.cgi?id=451615 external
https://bugzilla.redhat.com/show_bug.cgi?id=457597 external
https://bugzilla.redhat.com/show_bug.cgi?id=457934 external
https://bugzilla.redhat.com/show_bug.cgi?id=458250 external
https://bugzilla.redhat.com/show_bug.cgi?id=493381 external
https://bugzilla.redhat.com/show_bug.cgi?id=503928 external
https://bugzilla.redhat.com/show_bug.cgi?id=503978 external
https://bugzilla.redhat.com/show_bug.cgi?id=504390 external
https://bugzilla.redhat.com/show_bug.cgi?id=504555 external
https://bugzilla.redhat.com/show_bug.cgi?id=504753 external
https://bugzilla.redhat.com/show_bug.cgi?id=509125 external
https://bugzilla.redhat.com/show_bug.cgi?id=515698 external
https://bugzilla.redhat.com/show_bug.cgi?id=521619 external
https://bugzilla.redhat.com/show_bug.cgi?id=522209 external
https://bugzilla.redhat.com/show_bug.cgi?id=570171 external
https://bugzilla.redhat.com/show_bug.cgi?id=596426 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2005-2090 self
https://bugzilla.redhat.com/show_bug.cgi?id=237079 external
https://www.cve.org/CVERecord?id=CVE-2005-2090 external
https://nvd.nist.gov/vuln/detail/CVE-2005-2090 external
https://access.redhat.com/security/cve/CVE-2005-3510 self
https://bugzilla.redhat.com/show_bug.cgi?id=237085 external
https://www.cve.org/CVERecord?id=CVE-2005-3510 external
https://nvd.nist.gov/vuln/detail/CVE-2005-3510 external
https://access.redhat.com/security/cve/CVE-2006-3835 self
https://bugzilla.redhat.com/show_bug.cgi?id=237084 external
https://www.cve.org/CVERecord?id=CVE-2006-3835 external
https://nvd.nist.gov/vuln/detail/CVE-2006-3835 external
https://access.redhat.com/security/cve/CVE-2006-3918 self
https://bugzilla.redhat.com/show_bug.cgi?id=200732 external
https://www.cve.org/CVERecord?id=CVE-2006-3918 external
https://nvd.nist.gov/vuln/detail/CVE-2006-3918 external
https://access.redhat.com/security/cve/CVE-2006-5752 self
https://bugzilla.redhat.com/show_bug.cgi?id=245112 external
https://www.cve.org/CVERecord?id=CVE-2006-5752 external
https://nvd.nist.gov/vuln/detail/CVE-2006-5752 external
https://access.redhat.com/security/cve/CVE-2007-0450 self
https://bugzilla.redhat.com/show_bug.cgi?id=237080 external
https://www.cve.org/CVERecord?id=CVE-2007-0450 external
https://nvd.nist.gov/vuln/detail/CVE-2007-0450 external
https://access.redhat.com/security/cve/CVE-2007-1349 self
https://bugzilla.redhat.com/show_bug.cgi?id=240423 external
https://www.cve.org/CVERecord?id=CVE-2007-1349 external
https://nvd.nist.gov/vuln/detail/CVE-2007-1349 external
https://access.redhat.com/security/cve/CVE-2007-1358 self
https://bugzilla.redhat.com/show_bug.cgi?id=244803 external
https://www.cve.org/CVERecord?id=CVE-2007-1358 external
https://nvd.nist.gov/vuln/detail/CVE-2007-1358 external
https://access.redhat.com/security/cve/CVE-2007-1863 self
https://bugzilla.redhat.com/show_bug.cgi?id=244658 external
https://www.cve.org/CVERecord?id=CVE-2007-1863 external
https://nvd.nist.gov/vuln/detail/CVE-2007-1863 external
https://access.redhat.com/security/cve/CVE-2007-3304 self
https://bugzilla.redhat.com/show_bug.cgi?id=245111 external
https://www.cve.org/CVERecord?id=CVE-2007-3304 external
https://nvd.nist.gov/vuln/detail/CVE-2007-3304 external
https://access.redhat.com/security/cve/CVE-2007-3382 self
https://bugzilla.redhat.com/show_bug.cgi?id=247972 external
https://www.cve.org/CVERecord?id=CVE-2007-3382 external
https://nvd.nist.gov/vuln/detail/CVE-2007-3382 external
https://access.redhat.com/security/cve/CVE-2007-3385 self
https://bugzilla.redhat.com/show_bug.cgi?id=247976 external
https://www.cve.org/CVERecord?id=CVE-2007-3385 external
https://nvd.nist.gov/vuln/detail/CVE-2007-3385 external
https://access.redhat.com/security/cve/CVE-2007-3847 self
https://bugzilla.redhat.com/show_bug.cgi?id=250731 external
https://www.cve.org/CVERecord?id=CVE-2007-3847 external
https://nvd.nist.gov/vuln/detail/CVE-2007-3847 external
https://access.redhat.com/security/cve/CVE-2007-4465 self
https://bugzilla.redhat.com/show_bug.cgi?id=289511 external
https://www.cve.org/CVERecord?id=CVE-2007-4465 external
https://nvd.nist.gov/vuln/detail/CVE-2007-4465 external
https://access.redhat.com/security/cve/CVE-2007-5000 self
https://bugzilla.redhat.com/show_bug.cgi?id=419931 external
https://www.cve.org/CVERecord?id=CVE-2007-5000 external
https://nvd.nist.gov/vuln/detail/CVE-2007-5000 external
https://access.redhat.com/security/cve/CVE-2007-5116 self
https://bugzilla.redhat.com/show_bug.cgi?id=323571 external
https://www.cve.org/CVERecord?id=CVE-2007-5116 external
https://nvd.nist.gov/vuln/detail/CVE-2007-5116 external
https://access.redhat.com/security/cve/CVE-2007-5333 self
https://bugzilla.redhat.com/show_bug.cgi?id=427766 external
https://www.cve.org/CVERecord?id=CVE-2007-5333 external
https://nvd.nist.gov/vuln/detail/CVE-2007-5333 external
https://access.redhat.com/security/cve/CVE-2007-5461 self
https://bugzilla.redhat.com/show_bug.cgi?id=333791 external
https://www.cve.org/CVERecord?id=CVE-2007-5461 external
https://nvd.nist.gov/vuln/detail/CVE-2007-5461 external
https://access.redhat.com/security/cve/CVE-2007-6388 self
https://bugzilla.redhat.com/show_bug.cgi?id=427228 external
https://www.cve.org/CVERecord?id=CVE-2007-6388 external
https://nvd.nist.gov/vuln/detail/CVE-2007-6388 external
https://access.redhat.com/security/cve/CVE-2008-0005 self
https://bugzilla.redhat.com/show_bug.cgi?id=427739 external
https://www.cve.org/CVERecord?id=CVE-2008-0005 external
https://nvd.nist.gov/vuln/detail/CVE-2008-0005 external
https://access.redhat.com/security/cve/CVE-2008-0128 self
https://bugzilla.redhat.com/show_bug.cgi?id=429821 external
https://www.cve.org/CVERecord?id=CVE-2008-0128 external
https://nvd.nist.gov/vuln/detail/CVE-2008-0128 external
https://access.redhat.com/security/cve/CVE-2008-1232 self
https://bugzilla.redhat.com/show_bug.cgi?id=457597 external
https://www.cve.org/CVERecord?id=CVE-2008-1232 external
https://nvd.nist.gov/vuln/detail/CVE-2008-1232 external
https://access.redhat.com/security/cve/CVE-2008-1927 self
https://bugzilla.redhat.com/show_bug.cgi?id=443928 external
https://www.cve.org/CVERecord?id=CVE-2008-1927 external
https://nvd.nist.gov/vuln/detail/CVE-2008-1927 external
https://access.redhat.com/security/cve/CVE-2008-2364 self
https://bugzilla.redhat.com/show_bug.cgi?id=451615 external
https://www.cve.org/CVERecord?id=CVE-2008-2364 external
https://nvd.nist.gov/vuln/detail/CVE-2008-2364 external
https://access.redhat.com/security/cve/CVE-2008-2370 self
https://bugzilla.redhat.com/show_bug.cgi?id=457934 external
https://www.cve.org/CVERecord?id=CVE-2008-2370 external
https://nvd.nist.gov/vuln/detail/CVE-2008-2370 external
https://access.redhat.com/security/cve/CVE-2008-2939 self
https://bugzilla.redhat.com/show_bug.cgi?id=458250 external
https://www.cve.org/CVERecord?id=CVE-2008-2939 external
https://nvd.nist.gov/vuln/detail/CVE-2008-2939 external
https://access.redhat.com/security/cve/CVE-2008-5515 self
https://bugzilla.redhat.com/show_bug.cgi?id=504753 external
https://www.cve.org/CVERecord?id=CVE-2008-5515 external
https://nvd.nist.gov/vuln/detail/CVE-2008-5515 external
https://access.redhat.com/security/cve/CVE-2009-0023 self
https://bugzilla.redhat.com/show_bug.cgi?id=503928 external
https://www.cve.org/CVERecord?id=CVE-2009-0023 external
https://nvd.nist.gov/vuln/detail/CVE-2009-0023 external
https://access.redhat.com/security/cve/CVE-2009-0033 self
https://bugzilla.redhat.com/show_bug.cgi?id=493381 external
https://www.cve.org/CVERecord?id=CVE-2009-0033 external
https://nvd.nist.gov/vuln/detail/CVE-2009-0033 external
https://access.redhat.com/security/cve/CVE-2009-0580 self
https://bugzilla.redhat.com/show_bug.cgi?id=503978 external
https://www.cve.org/CVERecord?id=CVE-2009-0580 external
https://nvd.nist.gov/vuln/detail/CVE-2009-0580 external
https://access.redhat.com/security/cve/CVE-2009-1891 self
https://bugzilla.redhat.com/show_bug.cgi?id=509125 external
https://www.cve.org/CVERecord?id=CVE-2009-1891 external
https://nvd.nist.gov/vuln/detail/CVE-2009-1891 external
https://access.redhat.com/security/cve/CVE-2009-1955 self
https://bugzilla.redhat.com/show_bug.cgi?id=504555 external
https://www.cve.org/CVERecord?id=CVE-2009-1955 external
https://nvd.nist.gov/vuln/detail/CVE-2009-1955 external
https://access.redhat.com/security/cve/CVE-2009-1956 self
https://bugzilla.redhat.com/show_bug.cgi?id=504390 external
https://www.cve.org/CVERecord?id=CVE-2009-1956 external
https://nvd.nist.gov/vuln/detail/CVE-2009-1956 external
https://access.redhat.com/security/cve/CVE-2009-2412 self
https://bugzilla.redhat.com/show_bug.cgi?id=515698 external
https://www.cve.org/CVERecord?id=CVE-2009-2412 external
https://nvd.nist.gov/vuln/detail/CVE-2009-2412 external
https://access.redhat.com/security/cve/CVE-2009-3094 self
https://bugzilla.redhat.com/show_bug.cgi?id=521619 external
https://www.cve.org/CVERecord?id=CVE-2009-3094 external
https://nvd.nist.gov/vuln/detail/CVE-2009-3094 external
https://access.redhat.com/security/cve/CVE-2009-3095 self
https://bugzilla.redhat.com/show_bug.cgi?id=522209 external
https://www.cve.org/CVERecord?id=CVE-2009-3095 external
https://nvd.nist.gov/vuln/detail/CVE-2009-3095 external
https://access.redhat.com/security/cve/CVE-2009-4901 self
https://bugzilla.redhat.com/show_bug.cgi?id=596426 external
https://www.cve.org/CVERecord?id=CVE-2009-4901 external
https://nvd.nist.gov/vuln/detail/CVE-2009-4901 external
https://access.redhat.com/security/cve/CVE-2010-0407 self
https://www.cve.org/CVERecord?id=CVE-2010-0407 external
https://nvd.nist.gov/vuln/detail/CVE-2010-0407 external
https://access.redhat.com/security/cve/CVE-2010-0434 self
https://bugzilla.redhat.com/show_bug.cgi?id=570171 external
https://www.cve.org/CVERecord?id=CVE-2010-0434 external
https://nvd.nist.gov/vuln/detail/CVE-2010-0434 external
Acknowledgments
Tavis Ormandy Will Drewry

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated packages that fix multiple security issues and rebase various\ncomponents are now available for Red Hat Certificate System 7.3.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat Certificate System (RHCS) is an enterprise software system designed\nto manage enterprise Public Key Infrastructure (PKI) deployments.\n\nMultiple buffer overflow flaws were discovered in the way the pcscd daemon,\na resource manager that coordinates communications with smart card readers\nand smart cards connected to the system, handled client requests. A local\nuser could create a specially-crafted request that would cause the pcscd\ndaemon to crash or, possibly, execute arbitrary code. (CVE-2010-0407,\nCVE-2009-4901)\n\nThis erratum updates the Tomcat component shipped as part of Red Hat\nCertificate System to version 5.5.23, to address multiple security issues.\nIn a typical operating environment, Tomcat is not exposed to users of\nCertificate System in a vulnerable manner. These security updates will\nreduce risk in unique Certificate System environments. (CVE-2005-2090,\nCVE-2005-3510, CVE-2006-3835, CVE-2007-0450, CVE-2007-1358, CVE-2007-3382,\nCVE-2007-3385, CVE-2007-5461, CVE-2007-5333, CVE-2008-0128, CVE-2008-1232,\nCVE-2008-2370, CVE-2008-5515, CVE-2009-0033, CVE-2009-0580)\n\nThis erratum provides updated versions of the following components,\nrequired by the updated Tomcat version: ant, avalon-logkit, axis,\nclasspathx-jaf, classpathx-mail, geronimo-specs, jakarta-commons-modeler,\nlog4j, mx4j, xerces-j2, and xml-commons.\n\nA number of components have been updated to fix security issues for users\nof Red Hat Certificate System for the Solaris operating system. These fixes\nare for apr issue CVE-2009-2412; apr-util issues CVE-2009-0023,\nCVE-2009-1955, CVE-2009-1956, and CVE-2009-2412; httpd issues\nCVE-2006-3918, CVE-2006-5752, CVE-2007-1863, CVE-2007-3304, CVE-2007-3847,\nCVE-2007-4465, CVE-2007-5000, CVE-2007-6388, CVE-2008-0005, CVE-2008-2364,\nCVE-2008-2939, CVE-2009-1891, CVE-2009-3094, CVE-2009-3095, and\nCVE-2010-0434; mod_perl issue CVE-2007-1349; and perl issues CVE-2007-5116\nand CVE-2008-1927.\n\nNote: Updated apr, apr-util, httpd, mod_perl, and perl packages were\npreviously available to users of Red Hat Certificate System for Red Hat\nEnterprise Linux via the Red Hat Enterprise Linux 4 channels on the Red Hat\nNetwork.\n\nAdditionally, the rhpki-ca, rhpki-kra, rhpki-ocsp, rhpki-tks,\nrhpki-java-tools, and rhpki-native-tools packages were updated to address\nsome anomalous behavior on the Solaris operating system. (BZ#600513,\nBZ#605760)\n\nAs well, this update provides an updated rhpki-manage package, which\nincludes installation and uninstall scripts for Red Hat Certificate System\nthat have been updated with the list of packages required by the Tomcat\ncomponent, and an updated dependency on the NSS and NSPR packages.\n\nAll users of Red Hat Certificate System are advised to upgrade to these\nupdated packages, which correct these issues. Refer to the Red Hat\nCertificate System Administration Guide, linked to in the References, for\ndetails on how to install the updated packages on the Solaris operating\nsystem. After installing this update, all Red Hat Certificate System\nsubsystems must be restarted (\"/etc/init.d/[instance-name] restart\") for\nthe update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0602",
        "url": "https://access.redhat.com/errata/RHSA-2010:0602"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#moderate",
        "url": "http://www.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Guide/Administration_Guide-Updating_Certificate_System_Packages-Updating_a_Solaris_9_system_using_pkgrm_and_pkgadd.html",
        "url": "http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Guide/Administration_Guide-Updating_Certificate_System_Packages-Updating_a_Solaris_9_system_using_pkgrm_and_pkgadd.html"
      },
      {
        "category": "external",
        "summary": "200732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200732"
      },
      {
        "category": "external",
        "summary": "237079",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237079"
      },
      {
        "category": "external",
        "summary": "237080",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237080"
      },
      {
        "category": "external",
        "summary": "237084",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237084"
      },
      {
        "category": "external",
        "summary": "237085",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237085"
      },
      {
        "category": "external",
        "summary": "240423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240423"
      },
      {
        "category": "external",
        "summary": "244658",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244658"
      },
      {
        "category": "external",
        "summary": "244803",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244803"
      },
      {
        "category": "external",
        "summary": "245111",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245111"
      },
      {
        "category": "external",
        "summary": "245112",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245112"
      },
      {
        "category": "external",
        "summary": "247972",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
      },
      {
        "category": "external",
        "summary": "247976",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
      },
      {
        "category": "external",
        "summary": "250731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250731"
      },
      {
        "category": "external",
        "summary": "289511",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=289511"
      },
      {
        "category": "external",
        "summary": "323571",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=323571"
      },
      {
        "category": "external",
        "summary": "333791",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
      },
      {
        "category": "external",
        "summary": "419931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931"
      },
      {
        "category": "external",
        "summary": "427228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228"
      },
      {
        "category": "external",
        "summary": "427739",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427739"
      },
      {
        "category": "external",
        "summary": "427766",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
      },
      {
        "category": "external",
        "summary": "429821",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429821"
      },
      {
        "category": "external",
        "summary": "443928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443928"
      },
      {
        "category": "external",
        "summary": "451615",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615"
      },
      {
        "category": "external",
        "summary": "457597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
      },
      {
        "category": "external",
        "summary": "457934",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
      },
      {
        "category": "external",
        "summary": "458250",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250"
      },
      {
        "category": "external",
        "summary": "493381",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
      },
      {
        "category": "external",
        "summary": "503928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
      },
      {
        "category": "external",
        "summary": "503978",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
      },
      {
        "category": "external",
        "summary": "504390",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
      },
      {
        "category": "external",
        "summary": "504555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
      },
      {
        "category": "external",
        "summary": "504753",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
      },
      {
        "category": "external",
        "summary": "509125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
      },
      {
        "category": "external",
        "summary": "515698",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
      },
      {
        "category": "external",
        "summary": "521619",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
      },
      {
        "category": "external",
        "summary": "522209",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
      },
      {
        "category": "external",
        "summary": "570171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570171"
      },
      {
        "category": "external",
        "summary": "596426",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0602.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Certificate System 7.3 security update",
    "tracking": {
      "current_release_date": "2024-12-15T18:14:44+00:00",
      "generator": {
        "date": "2024-12-15T18:14:44+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.3"
        }
      },
      "id": "RHSA-2010:0602",
      "initial_release_date": "2010-08-04T21:30:00+00:00",
      "revision_history": [
        {
          "date": "2010-08-04T21:30:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-08-05T10:04:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-15T18:14:44+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Certificate System 7.3 for 4AS",
                "product": {
                  "name": "Red Hat Certificate System 7.3 for 4AS",
                  "product_id": "4AS-CERT-7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:certificate_system:7.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Certificate System 7.3 for 4ES",
                "product": {
                  "name": "Red Hat Certificate System 7.3 for 4ES",
                  "product_id": "4ES-CERT-7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:certificate_system:7.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Certificate System"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
                "product": {
                  "name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
                  "product_id": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons-apis@1.3.02-2jpp_1rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
                "product": {
                  "name": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
                  "product_id": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons@1.3.02-2jpp_1rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
                "product": {
                  "name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
                  "product_id": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-1jpp_1rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ant-0:1.6.5-1jpp_1rh.noarch",
                "product": {
                  "name": "ant-0:1.6.5-1jpp_1rh.noarch",
                  "product_id": "ant-0:1.6.5-1jpp_1rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ant@1.6.5-1jpp_1rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
                "product": {
                  "name": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
                  "product_id": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/avalon-logkit@1.2-2jpp_4rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "axis-0:1.2.1-1jpp_3rh.noarch",
                "product": {
                  "name": "axis-0:1.2.1-1jpp_3rh.noarch",
                  "product_id": "axis-0:1.2.1-1jpp_3rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/axis@1.2.1-1jpp_3rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
                "product": {
                  "name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
                  "product_id": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/classpathx-jaf@1.0-2jpp_6rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
                "product": {
                  "name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
                  "product_id": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/classpathx-mail@1.1.1-2jpp_8rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "log4j-0:1.2.12-1jpp_1rh.noarch",
                "product": {
                  "name": "log4j-0:1.2.12-1jpp_1rh.noarch",
                  "product_id": "log4j-0:1.2.12-1jpp_1rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/log4j@1.2.12-1jpp_1rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mx4j-1:3.0.1-1jpp_4rh.noarch",
                "product": {
                  "name": "mx4j-1:3.0.1-1jpp_4rh.noarch",
                  "product_id": "mx4j-1:3.0.1-1jpp_4rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mx4j@3.0.1-1jpp_4rh?arch=noarch\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
                "product": {
                  "name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
                  "product_id": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3jpp_2rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
                "product": {
                  "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.16?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
                "product": {
                  "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.16?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
                "product": {
                  "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.16?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
                "product": {
                  "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.16?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
                "product": {
                  "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.16?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhpki-manage-0:7.3.0-19.el4.noarch",
                "product": {
                  "name": "rhpki-manage-0:7.3.0-19.el4.noarch",
                  "product_id": "rhpki-manage-0:7.3.0-19.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhpki-manage@7.3.0-19.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhpki-ca-0:7.3.0-20.el4.noarch",
                "product": {
                  "name": "rhpki-ca-0:7.3.0-20.el4.noarch",
                  "product_id": "rhpki-ca-0:7.3.0-20.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhpki-ca@7.3.0-20.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhpki-kra-0:7.3.0-14.el4.noarch",
                "product": {
                  "name": "rhpki-kra-0:7.3.0-14.el4.noarch",
                  "product_id": "rhpki-kra-0:7.3.0-14.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhpki-kra@7.3.0-14.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhpki-tks-0:7.3.0-13.el4.noarch",
                "product": {
                  "name": "rhpki-tks-0:7.3.0-13.el4.noarch",
                  "product_id": "rhpki-tks-0:7.3.0-13.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhpki-tks@7.3.0-13.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
                "product": {
                  "name": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
                  "product_id": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhpki-ocsp@7.3.0-13.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
                "product": {
                  "name": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
                  "product_id": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhpki-java-tools@7.3.0-10.el4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-specs@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-jms-1.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-jta-1.0.1B-api@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-j2ee-deployment-1.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-ejb-2.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-servlet-2.4-api@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-specs-javadoc@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-j2ee-1.4-apis@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-j2ee-connector-1.5-api@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-jsp-2.0-api@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
                "product": {
                  "name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_id": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-j2ee-management-1.0-api@1.0-0.M4.1jpp_10rh?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xml-commons-0:1.3.02-2jpp_1rh.src",
                "product": {
                  "name": "xml-commons-0:1.3.02-2jpp_1rh.src",
                  "product_id": "xml-commons-0:1.3.02-2jpp_1rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xml-commons@1.3.02-2jpp_1rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xerces-j2-0:2.7.1-1jpp_1rh.src",
                "product": {
                  "name": "xerces-j2-0:2.7.1-1jpp_1rh.src",
                  "product_id": "xerces-j2-0:2.7.1-1jpp_1rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-1jpp_1rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "ant-0:1.6.5-1jpp_1rh.src",
                "product": {
                  "name": "ant-0:1.6.5-1jpp_1rh.src",
                  "product_id": "ant-0:1.6.5-1jpp_1rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/ant@1.6.5-1jpp_1rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "avalon-logkit-0:1.2-2jpp_4rh.src",
                "product": {
                  "name": "avalon-logkit-0:1.2-2jpp_4rh.src",
                  "product_id": "avalon-logkit-0:1.2-2jpp_4rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/avalon-logkit@1.2-2jpp_4rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "axis-0:1.2.1-1jpp_3rh.src",
                "product": {
                  "name": "axis-0:1.2.1-1jpp_3rh.src",
                  "product_id": "axis-0:1.2.1-1jpp_3rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/axis@1.2.1-1jpp_3rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "classpathx-jaf-0:1.0-2jpp_6rh.src",
                "product": {
                  "name": "classpathx-jaf-0:1.0-2jpp_6rh.src",
                  "product_id": "classpathx-jaf-0:1.0-2jpp_6rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/classpathx-jaf@1.0-2jpp_6rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
                "product": {
                  "name": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
                  "product_id": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/classpathx-mail@1.1.1-2jpp_8rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "log4j-0:1.2.12-1jpp_1rh.src",
                "product": {
                  "name": "log4j-0:1.2.12-1jpp_1rh.src",
                  "product_id": "log4j-0:1.2.12-1jpp_1rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/log4j@1.2.12-1jpp_1rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mx4j-1:3.0.1-1jpp_4rh.src",
                "product": {
                  "name": "mx4j-1:3.0.1-1jpp_4rh.src",
                  "product_id": "mx4j-1:3.0.1-1jpp_4rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mx4j@3.0.1-1jpp_4rh?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
                "product": {
                  "name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
                  "product_id": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3jpp_2rh?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
                "product": {
                  "name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
                  "product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-0:1.3.3-3.el4.src",
                "product": {
                  "name": "pcsc-lite-0:1.3.3-3.el4.src",
                  "product_id": "pcsc-lite-0:1.3.3-3.el4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
                "product": {
                  "name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
                  "product_id": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/geronimo-specs@1.0-0.M4.1jpp_10rh?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
                "product": {
                  "name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
                  "product_id": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhpki-native-tools@7.3.0-6.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
                "product": {
                  "name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
                  "product_id": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite-debuginfo@1.3.3-3.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
                "product": {
                  "name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
                  "product_id": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite-doc@1.3.3-3.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-0:1.3.3-3.el4.x86_64",
                "product": {
                  "name": "pcsc-lite-0:1.3.3-3.el4.x86_64",
                  "product_id": "pcsc-lite-0:1.3.3-3.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
                "product": {
                  "name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
                  "product_id": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite-libs@1.3.3-3.el4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rhpki-native-tools-0:7.3.0-6.el4.i386",
                "product": {
                  "name": "rhpki-native-tools-0:7.3.0-6.el4.i386",
                  "product_id": "rhpki-native-tools-0:7.3.0-6.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhpki-native-tools@7.3.0-6.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
                "product": {
                  "name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
                  "product_id": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite-debuginfo@1.3.3-3.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
                "product": {
                  "name": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
                  "product_id": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite-doc@1.3.3-3.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-0:1.3.3-3.el4.i386",
                "product": {
                  "name": "pcsc-lite-0:1.3.3-3.el4.i386",
                  "product_id": "pcsc-lite-0:1.3.3-3.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
                "product": {
                  "name": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
                  "product_id": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/pcsc-lite-libs@1.3.3-3.el4?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ant-0:1.6.5-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch"
        },
        "product_reference": "ant-0:1.6.5-1jpp_1rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ant-0:1.6.5-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src"
        },
        "product_reference": "ant-0:1.6.5-1jpp_1rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "avalon-logkit-0:1.2-2jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch"
        },
        "product_reference": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "avalon-logkit-0:1.2-2jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src"
        },
        "product_reference": "avalon-logkit-0:1.2-2jpp_4rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "axis-0:1.2.1-1jpp_3rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch"
        },
        "product_reference": "axis-0:1.2.1-1jpp_3rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "axis-0:1.2.1-1jpp_3rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src"
        },
        "product_reference": "axis-0:1.2.1-1jpp_3rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch"
        },
        "product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "classpathx-jaf-0:1.0-2jpp_6rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src"
        },
        "product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch"
        },
        "product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "classpathx-mail-0:1.1.1-2jpp_8rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src"
        },
        "product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src"
        },
        "product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "log4j-0:1.2.12-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch"
        },
        "product_reference": "log4j-0:1.2.12-1jpp_1rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "log4j-0:1.2.12-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src"
        },
        "product_reference": "log4j-0:1.2.12-1jpp_1rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mx4j-1:3.0.1-1jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch"
        },
        "product_reference": "mx4j-1:3.0.1-1jpp_4rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mx4j-1:3.0.1-1jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src"
        },
        "product_reference": "mx4j-1:3.0.1-1jpp_4rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386"
        },
        "product_reference": "pcsc-lite-0:1.3.3-3.el4.i386",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-0:1.3.3-3.el4.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src"
        },
        "product_reference": "pcsc-lite-0:1.3.3-3.el4.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64"
        },
        "product_reference": "pcsc-lite-0:1.3.3-3.el4.x86_64",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386"
        },
        "product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64"
        },
        "product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-doc-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386"
        },
        "product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64"
        },
        "product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-libs-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386"
        },
        "product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64"
        },
        "product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-ca-0:7.3.0-20.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch"
        },
        "product_reference": "rhpki-ca-0:7.3.0-20.el4.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-java-tools-0:7.3.0-10.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch"
        },
        "product_reference": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-kra-0:7.3.0-14.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch"
        },
        "product_reference": "rhpki-kra-0:7.3.0-14.el4.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-manage-0:7.3.0-19.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch"
        },
        "product_reference": "rhpki-manage-0:7.3.0-19.el4.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-native-tools-0:7.3.0-6.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386"
        },
        "product_reference": "rhpki-native-tools-0:7.3.0-6.el4.i386",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64"
        },
        "product_reference": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-ocsp-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch"
        },
        "product_reference": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-tks-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch"
        },
        "product_reference": "rhpki-tks-0:7.3.0-13.el4.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch"
        },
        "product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.7.1-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src"
        },
        "product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch"
        },
        "product_reference": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-0:1.3.02-2jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src"
        },
        "product_reference": "xml-commons-0:1.3.02-2jpp_1rh.src",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
          "product_id": "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        },
        "product_reference": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
        "relates_to_product_reference": "4AS-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ant-0:1.6.5-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch"
        },
        "product_reference": "ant-0:1.6.5-1jpp_1rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ant-0:1.6.5-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src"
        },
        "product_reference": "ant-0:1.6.5-1jpp_1rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "avalon-logkit-0:1.2-2jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch"
        },
        "product_reference": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "avalon-logkit-0:1.2-2jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src"
        },
        "product_reference": "avalon-logkit-0:1.2-2jpp_4rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "axis-0:1.2.1-1jpp_3rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch"
        },
        "product_reference": "axis-0:1.2.1-1jpp_3rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "axis-0:1.2.1-1jpp_3rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src"
        },
        "product_reference": "axis-0:1.2.1-1jpp_3rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch"
        },
        "product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "classpathx-jaf-0:1.0-2jpp_6rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src"
        },
        "product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch"
        },
        "product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "classpathx-mail-0:1.1.1-2jpp_8rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src"
        },
        "product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src"
        },
        "product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch"
        },
        "product_reference": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src"
        },
        "product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "log4j-0:1.2.12-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch"
        },
        "product_reference": "log4j-0:1.2.12-1jpp_1rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "log4j-0:1.2.12-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src"
        },
        "product_reference": "log4j-0:1.2.12-1jpp_1rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mx4j-1:3.0.1-1jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch"
        },
        "product_reference": "mx4j-1:3.0.1-1jpp_4rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mx4j-1:3.0.1-1jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src"
        },
        "product_reference": "mx4j-1:3.0.1-1jpp_4rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386"
        },
        "product_reference": "pcsc-lite-0:1.3.3-3.el4.i386",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-0:1.3.3-3.el4.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src"
        },
        "product_reference": "pcsc-lite-0:1.3.3-3.el4.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64"
        },
        "product_reference": "pcsc-lite-0:1.3.3-3.el4.x86_64",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386"
        },
        "product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64"
        },
        "product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-doc-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386"
        },
        "product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64"
        },
        "product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-libs-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386"
        },
        "product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64"
        },
        "product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-ca-0:7.3.0-20.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch"
        },
        "product_reference": "rhpki-ca-0:7.3.0-20.el4.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-java-tools-0:7.3.0-10.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch"
        },
        "product_reference": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-kra-0:7.3.0-14.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch"
        },
        "product_reference": "rhpki-kra-0:7.3.0-14.el4.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-manage-0:7.3.0-19.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch"
        },
        "product_reference": "rhpki-manage-0:7.3.0-19.el4.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-native-tools-0:7.3.0-6.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386"
        },
        "product_reference": "rhpki-native-tools-0:7.3.0-6.el4.i386",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64"
        },
        "product_reference": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-ocsp-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch"
        },
        "product_reference": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhpki-tks-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch"
        },
        "product_reference": "rhpki-tks-0:7.3.0-13.el4.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src"
        },
        "product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
        },
        "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch"
        },
        "product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xerces-j2-0:2.7.1-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src"
        },
        "product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch"
        },
        "product_reference": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-0:1.3.02-2jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src"
        },
        "product_reference": "xml-commons-0:1.3.02-2jpp_1rh.src",
        "relates_to_product_reference": "4ES-CERT-7.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
          "product_id": "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        },
        "product_reference": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
        "relates_to_product_reference": "4ES-CERT-7.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2005-2090",
      "discovery_date": "2005-06-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "237079"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a \"Transfer-Encoding: chunked\" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka \"HTTP Request Smuggling.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat multiple content-length header poisioning",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2005-2090"
        },
        {
          "category": "external",
          "summary": "RHBZ#237079",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237079"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2090",
          "url": "https://www.cve.org/CVERecord?id=CVE-2005-2090"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2090",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2090"
        }
      ],
      "release_date": "2005-06-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat multiple content-length header poisioning"
    },
    {
      "cve": "CVE-2005-3510",
      "discovery_date": "2005-11-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "237085"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat DoS",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2005-3510"
        },
        {
          "category": "external",
          "summary": "RHBZ#237085",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237085"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3510",
          "url": "https://www.cve.org/CVERecord?id=CVE-2005-3510"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3510",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3510"
        }
      ],
      "release_date": "2005-11-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat DoS"
    },
    {
      "cve": "CVE-2006-3835",
      "discovery_date": "2006-07-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "237084"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat directory listing issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not a security issue in Tomcat itself, but is caused when directory listings are enabled.\n\nDetails on how to disable directory listings are available at: http://tomcat.apache.org/faq/misc.html#listing",
          "title": "Statement"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-3835"
        },
        {
          "category": "external",
          "summary": "RHBZ#237084",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237084"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3835",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-3835"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3835",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3835"
        }
      ],
      "release_date": "2006-07-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat directory listing issue"
    },
    {
      "cve": "CVE-2006-3918",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2006-07-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "200732"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Expect header XSS",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-3918"
        },
        {
          "category": "external",
          "summary": "RHBZ#200732",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200732"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3918",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-3918"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3918",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3918"
        }
      ],
      "release_date": "2006-05-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Expect header XSS"
    },
    {
      "cve": "CVE-2006-5752",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2007-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "245112"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform \"charset detection\" when the content-type is not specified.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd mod_status XSS",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2006-5752"
        },
        {
          "category": "external",
          "summary": "RHBZ#245112",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245112"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5752",
          "url": "https://www.cve.org/CVERecord?id=CVE-2006-5752"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5752",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5752"
        }
      ],
      "release_date": "2007-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd mod_status XSS"
    },
    {
      "cve": "CVE-2007-0450",
      "discovery_date": "2007-03-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "237080"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) \"/\" (slash), (2) \"\\\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat directory traversal",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-0450"
        },
        {
          "category": "external",
          "summary": "RHBZ#237080",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237080"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-0450",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-0450"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0450",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0450"
        }
      ],
      "release_date": "2007-03-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat directory traversal"
    },
    {
      "cve": "CVE-2007-1349",
      "discovery_date": "2007-05-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "240423"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mod_perl PerlRun denial of service",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-1349"
        },
        {
          "category": "external",
          "summary": "RHBZ#240423",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240423"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1349",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-1349"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1349",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1349"
        }
      ],
      "release_date": "2007-03-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mod_perl PerlRun denial of service"
    },
    {
      "cve": "CVE-2007-1358",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2007-04-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "244803"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted \"Accept-Language headers that do not conform to RFC 2616\".",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat accept-language xss flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-1358"
        },
        {
          "category": "external",
          "summary": "RHBZ#244803",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244803"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1358",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-1358"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1358",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1358"
        }
      ],
      "release_date": "2007-06-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat accept-language xss flaw"
    },
    {
      "cve": "CVE-2007-1863",
      "discovery_date": "2007-05-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "244658"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd mod_cache segfault",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-1863"
        },
        {
          "category": "external",
          "summary": "RHBZ#244658",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=244658"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1863",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-1863"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1863",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1863"
        }
      ],
      "release_date": "2007-05-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd mod_cache segfault"
    },
    {
      "cve": "CVE-2007-3304",
      "discovery_date": "2007-06-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "245111"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka \"SIGUSR1 killer.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd scoreboard lack of PID protection",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-3304"
        },
        {
          "category": "external",
          "summary": "RHBZ#245111",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245111"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3304",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-3304"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3304",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3304"
        }
      ],
      "release_date": "2007-06-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd scoreboard lack of PID protection"
    },
    {
      "cve": "CVE-2007-3382",
      "discovery_date": "2007-07-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "247972"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat handling of cookies",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-3382"
        },
        {
          "category": "external",
          "summary": "RHBZ#247972",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
        }
      ],
      "release_date": "2007-08-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat handling of cookies"
    },
    {
      "cve": "CVE-2007-3385",
      "discovery_date": "2007-07-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "247976"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat handling of cookie values",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-3385"
        },
        {
          "category": "external",
          "summary": "RHBZ#247976",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385"
        }
      ],
      "release_date": "2007-08-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat handling of cookie values"
    },
    {
      "cve": "CVE-2007-3847",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2007-08-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "250731"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: out of bounds read",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-3847"
        },
        {
          "category": "external",
          "summary": "RHBZ#250731",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250731"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3847",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-3847"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3847",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3847"
        }
      ],
      "release_date": "2007-08-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: out of bounds read"
    },
    {
      "cve": "CVE-2007-4465",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2007-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "289511"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mod_autoindex XSS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This is actually a flaw in browsers that do not derive the response character set as required by RFC 2616. This does not affect the default configuration of Apache httpd in Red Hat products and will only affect customers who have removed the \"AddDefaultCharset\" directive and are using directory indexes. The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
          "title": "Statement"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-4465"
        },
        {
          "category": "external",
          "summary": "RHBZ#289511",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=289511"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4465",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-4465"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4465",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4465"
        }
      ],
      "release_date": "2007-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mod_autoindex XSS"
    },
    {
      "cve": "CVE-2007-5000",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2007-12-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "419931"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_imagemap XSS",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5000"
        },
        {
          "category": "external",
          "summary": "RHBZ#419931",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5000",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5000"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5000",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5000"
        }
      ],
      "release_date": "2007-12-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: mod_imagemap XSS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Tavis Ormandy",
            "Will Drewry"
          ]
        }
      ],
      "cve": "CVE-2007-5116",
      "discovery_date": "2007-09-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "323571"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "perl regular expression UTF parsing errors",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5116"
        },
        {
          "category": "external",
          "summary": "RHBZ#323571",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=323571"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5116",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5116"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5116",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5116"
        }
      ],
      "release_date": "2007-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "perl regular expression UTF parsing errors"
    },
    {
      "cve": "CVE-2007-5333",
      "discovery_date": "2008-01-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "427766"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Improve cookie parsing for tomcat5",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
          "title": "Statement"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5333"
        },
        {
          "category": "external",
          "summary": "RHBZ#427766",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
        }
      ],
      "release_date": "2008-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "Improve cookie parsing for tomcat5"
    },
    {
      "cve": "CVE-2007-5461",
      "discovery_date": "2007-10-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "333791"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Absolute path traversal Apache Tomcat WEBDAV",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5461"
        },
        {
          "category": "external",
          "summary": "RHBZ#333791",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
        }
      ],
      "release_date": "2007-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Absolute path traversal Apache Tomcat WEBDAV"
    },
    {
      "cve": "CVE-2007-6388",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2008-01-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "427228"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apache mod_status cross-site scripting",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-6388"
        },
        {
          "category": "external",
          "summary": "RHBZ#427228",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6388",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-6388"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6388",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6388"
        }
      ],
      "release_date": "2007-12-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apache mod_status cross-site scripting"
    },
    {
      "cve": "CVE-2008-0005",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2008-01-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "427739"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mod_proxy_ftp XSS",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-0005"
        },
        {
          "category": "external",
          "summary": "RHBZ#427739",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427739"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0005",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-0005"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0005",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0005"
        }
      ],
      "release_date": "2008-01-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mod_proxy_ftp XSS"
    },
    {
      "cve": "CVE-2008-0128",
      "discovery_date": "2008-01-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "429821"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat5 SSO cookie login information disclosure",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-0128"
        },
        {
          "category": "external",
          "summary": "RHBZ#429821",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=429821"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0128",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-0128"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0128",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0128"
        }
      ],
      "release_date": "2006-12-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat5 SSO cookie login information disclosure"
    },
    {
      "cve": "CVE-2008-1232",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2008-08-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "457597"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Cross-Site-Scripting enabled by sendError call",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-1232"
        },
        {
          "category": "external",
          "summary": "RHBZ#457597",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1232",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232"
        }
      ],
      "release_date": "2008-08-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: Cross-Site-Scripting enabled by sendError call"
    },
    {
      "cve": "CVE-2008-1927",
      "discovery_date": "2008-04-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "443928"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters.  NOTE: this issue might only be present on certain operating systems.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "perl: heap corruption by regular expressions with utf8 characters",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-1927"
        },
        {
          "category": "external",
          "summary": "RHBZ#443928",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443928"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1927",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-1927"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927"
        }
      ],
      "release_date": "2007-12-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "perl: heap corruption by regular expressions with utf8 characters"
    },
    {
      "cve": "CVE-2008-2364",
      "discovery_date": "2008-05-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "451615"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364\n\nThe Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
          "title": "Statement"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2364"
        },
        {
          "category": "external",
          "summary": "RHBZ#451615",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2364",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2364"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364"
        }
      ],
      "release_date": "2008-06-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server"
    },
    {
      "cve": "CVE-2008-2370",
      "discovery_date": "2008-08-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "457934"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat RequestDispatcher information disclosure vulnerability",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2370"
        },
        {
          "category": "external",
          "summary": "RHBZ#457934",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2370",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370"
        }
      ],
      "release_date": "2008-08-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat RequestDispatcher information disclosure vulnerability"
    },
    {
      "cve": "CVE-2008-2939",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2008-08-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "458250"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy_ftp globbing XSS",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-2939"
        },
        {
          "category": "external",
          "summary": "RHBZ#458250",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2939",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939"
        }
      ],
      "release_date": "2008-08-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: mod_proxy_ftp globbing XSS"
    },
    {
      "cve": "CVE-2008-5515",
      "discovery_date": "2009-06-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504753"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat request dispatcher information disclosure vulnerability",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-5515"
        },
        {
          "category": "external",
          "summary": "RHBZ#504753",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
        }
      ],
      "release_date": "2009-06-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat request dispatcher information disclosure vulnerability"
    },
    {
      "cve": "CVE-2009-0023",
      "discovery_date": "2009-06-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "503928"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr-util heap buffer underwrite",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0023"
        },
        {
          "category": "external",
          "summary": "RHBZ#503928",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0023",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023"
        }
      ],
      "release_date": "2009-06-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "SINGLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr-util heap buffer underwrite"
    },
    {
      "cve": "CVE-2009-0033",
      "discovery_date": "2009-01-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat6 Denial-Of-Service with AJP connection",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0033"
        },
        {
          "category": "external",
          "summary": "RHBZ#493381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
        }
      ],
      "release_date": "2009-06-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat6 Denial-Of-Service with AJP connection"
    },
    {
      "cve": "CVE-2009-0580",
      "discovery_date": "2009-06-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "503978"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat6 Information disclosure in authentication classes",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0580"
        },
        {
          "category": "external",
          "summary": "RHBZ#503978",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
        }
      ],
      "release_date": "2009-06-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat6 Information disclosure in authentication classes"
    },
    {
      "cve": "CVE-2009-1891",
      "discovery_date": "2009-06-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "509125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1891"
        },
        {
          "category": "external",
          "summary": "RHBZ#509125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
    },
    {
      "cve": "CVE-2009-1955",
      "discovery_date": "2009-06-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504555"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr-util billion laughs attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1955"
        },
        {
          "category": "external",
          "summary": "RHBZ#504555",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1955",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955"
        }
      ],
      "release_date": "2009-06-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr-util billion laughs attack"
    },
    {
      "cve": "CVE-2009-1956",
      "discovery_date": "2009-06-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504390"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr-util single NULL byte buffer overflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1956"
        },
        {
          "category": "external",
          "summary": "RHBZ#504390",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1956",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1956",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1956"
        }
      ],
      "release_date": "2009-04-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr-util single NULL byte buffer overflow"
    },
    {
      "cve": "CVE-2009-2412",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2009-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "515698"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2412"
        },
        {
          "category": "external",
          "summary": "RHBZ#515698",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2412",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412"
        }
      ],
      "release_date": "2009-08-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management"
    },
    {
      "cve": "CVE-2009-3094",
      "discovery_date": "2009-09-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "521619"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3094"
        },
        {
          "category": "external",
          "summary": "RHBZ#521619",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3094",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094"
        }
      ],
      "release_date": "2009-09-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply"
    },
    {
      "cve": "CVE-2009-3095",
      "discovery_date": "2009-09-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "522209"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3095"
        },
        {
          "category": "external",
          "summary": "RHBZ#522209",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3095",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095"
        }
      ],
      "release_date": "2009-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header"
    },
    {
      "cve": "CVE-2009-4901",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "596426"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4901"
        },
        {
          "category": "external",
          "summary": "RHBZ#596426",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4901",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4901",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4901"
        }
      ],
      "release_date": "2010-06-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages"
    },
    {
      "cve": "CVE-2010-0407",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2010-05-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "596426"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-0407"
        },
        {
          "category": "external",
          "summary": "RHBZ#596426",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0407",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0407",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0407"
        }
      ],
      "release_date": "2010-06-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages"
    },
    {
      "cve": "CVE-2010-0434",
      "discovery_date": "2010-03-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: request header information leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
          "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
          "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
          "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
          "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
          "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
          "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
          "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
          "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
          "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
          "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
          "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
          "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
          "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
          "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
          "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
          "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
          "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
          "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
          "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
          "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
          "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-0434"
        },
        {
          "category": "external",
          "summary": "RHBZ#570171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0434",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0434",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0434"
        }
      ],
      "release_date": "2009-12-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-08-04T21:30:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0602"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
            "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
            "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
            "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
            "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
            "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
            "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
            "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
            "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
            "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
            "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
            "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
            "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
            "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
            "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
            "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
            "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
            "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
            "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
            "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
            "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
            "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: request header information leak"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…