Search criteria
ⓘ
Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.
6 vulnerabilities found for IPCOM Series by FUJITSU
VAR-200810-0004
Vulnerability from variot - Updated: 2026-03-09 22:15The IPv6 Neighbor Discovery Protocol (NDP) implementation in (1) FreeBSD 6.3 through 7.1, (2) OpenBSD 4.2 and 4.3, (3) NetBSD, (4) Force10 FTOS before E7.7.1.1, (5) Juniper JUNOS, and (6) Wind River VxWorks 5.x through 6.4 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity) or read private network traffic via a spoofed message that modifies the Forward Information Base (FIB). A vulnerability in some implementations of the IPv6 Neighbor Discovery Protocol may allow a nearby attacker to intercept traffic or cause congested links to become overloaded. This false information can modify the Forward Information Base (FIB). Operating systems affected by the vulnerability: Wind River Systems VxWorks 6.4 Wind River Systems VxWorks 5 OpenBSD OpenBSD 4.4 OpenBSD OpenBSD 4.3 OpenBSD OpenBSD 4.2 NetBSD NetBSD 3.0.2 NetBSD NetBSD 3.0.1 NetBSD NetBSD Current NetBSD NetBSD 4.0 NetBSD NetBSD 3.1_RC3 NetBSD NetBSD 3.1 NetBSD NetBSD 3.1 NetBSD NetBSD 3,1_RC1 Navision Financials Server 3.0 MidnightBSD MidnightBSD 0.2.1 MidnightBSD MidnightBSD 0.1.1 MidnightBSD MidnightBSD 0.3 MidnightBSD MidnightBSD 0.1 Juniper Networks WXC Series 0 Juniper Networks WX Series 0 Juniper Networks Session and Resource Control Appliance 2.0 Juniper Networks Session and Resource Control Appliance 1. ----------------------------------------------------------------------
Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list?
Click here to learn more: http://secunia.com/advisories/business_solutions/
TITLE: HP-UX IPv6 Neighbor Discovery Protocol Neighbor Solicitation Vulnerability
SECUNIA ADVISORY ID: SA33787
VERIFY ADVISORY: http://secunia.com/advisories/33787/
CRITICAL: Less critical
IMPACT: Spoofing, Exposure of sensitive information, DoS
WHERE:
From local network
OPERATING SYSTEM: HP-UX 11.x http://secunia.com/advisories/product/138/
DESCRIPTION: A vulnerability has been reported in HP-UX, which can be exploited by malicious people to conduct spoofing attacks, disclose potentially sensitive information, or to cause a DoS (Denial of Service).
This is related to: SA32112
The vulnerability is reported in HP-UX B.11.11, B.11.23, and B.11.31 running IPv6.
SOLUTION: Apply patches.
HP-UX B.11.11: Install patch PHNE_37898 or subsequent.
HP-UX B.11.23: Install patch PHNE_37897 or subsequent.
HP-UX B.11.31: Install patch PHNE_38680 or subsequent.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: HPSBUX02407 SSRT080107: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662367
OTHER REFERENCES: SA32112: http://secunia.com/advisories/32112/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. Vendor affected: TP-Link (http://tp-link.com)
Products affected: * All TP-Link VxWorks-based devices (confirmed by vendor) * All "2-series" switches (confirmed by vendor) * TL-SG2008 semi-managed switch (confirmed by vendor) * TL-SG2216 semi-managed switch (confirmed by vendor) * TL-SG2424 semi-managed switch (confirmed by vendor) * TL-SG2424P semi-managed switch (confirmed by vendor) * TL-SG2452 semi-managed switch (confirmed by vendor)
Vulnerabilities: * All previously-reported VxWorks vulnerabilities from 6.6.0 on; at the very least: * CVE-2013-0716 (confirmed by vendor) * CVE-2013-0715 (confirmed by vendor) * CVE-2013-0714 (confirmed by vendor) * CVE-2013-0713 (confirmed by vendor) * CVE-2013-0712 (confirmed by vendor) * CVE-2013-0711 (confirmed by vendor) * CVE-2010-2967 (confirmed by vendor) * CVE-2010-2966 (confirmed by vendor) * CVE-2008-2476 (confirmed by vendor) * SSLv2 is available and cannot be disabled unless HTTPS is completely disabled (allows downgrade attacks) (confirmed by vendor) * SSL (v2, v3) offers insecure cipher suites and HMACs which cannot be disabled (allows downgrade attacks) (confirmed by vendor)
Design flaws: * Telnet is available and cannot be disabled (confirmed by vendor) * SSHv1 enabled by default if SSH is enabled (confirmed by vendor)
Vendor response: TP-Link are not convinced that these flaws should be repaired.
TP-Link's Internet presence -- or at least DNS -- is available only intermittently. Most emails bounced. Lost contact with vendor, but did confirm that development lead is now on holiday and will not return for at least a week.
Initial vendor reaction was to recommend purchase of "3-series" switches. Vendor did not offer reasons why "3-series" switches would be more secure, apart from lack of telnet service. Vendor confirmed that no development time can be allocated to securing "2-series" product and all focus has shifted to newer products.
(TL-SG2008 first product availability July 2014...)
Vendor deeply confused about security of DES/3DES, MD5, claimed that all security is relative. ("...[E]ven SHA-1 can be cracked, they just have different security level.")
Fix availability: None.
Work-arounds advised: None possible. Remove products from network. Corrected: 2008-10-01 00:32:59 UTC (RELENG_7, 7.1-PRERELEASE) 2008-10-01 00:32:59 UTC (RELENG_7_0, 7.0-RELEASE-p5) 2008-10-01 00:32:59 UTC (RELENG_6, 6.4-PRERELEASE) 2008-10-01 00:32:59 UTC (RELENG_6_3, 6.3-RELEASE-p5) CVE Name: CVE-2008-2476
For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .
I. Background
IPv6 nodes use the Neighbor Discovery protocol to determine the link-layer address of other nodes, find routers, and maintain reachability information. The Neighbor Discovery protocol uses Neighbor Solicitation (ICMPv6 type 135) to query target nodes for their link-layer addresses.
II. Problem Description
IPv6 routers may allow "on-link" IPv6 nodes to create and update the router's neighbor cache and forwarding information. A malicious IPv6 node sharing a common router but on a different physical segment from another node may be able to spoof Neighbor Discovery messages, allowing it to update router information for the victim node.
III. Impact
An attacker on a different physical network connected to the same IPv6 router as another node could redirect IPv6 traffic intended for that node.
IV. Workaround
Firewall packet filters can be used to filter incoming Neighbor Solicitation messages but may interfere with normal IPv6 operation if not configured carefully.
Reverse path forwarding checks could be used to make gateways, such as routers or firewalls, drop Neighbor Solicitation messages from nodes with unexpected source addresses on a particular interface.
V. Solution
NOTE WELL: The solution described below causes IPv6 Neighbor Discovery Neighbor Solicitation messages from non-neighbors to be ignored. This can be re-enabled if required by setting the newly added net.inet6.icmp6.nd6_onlink_ns_rfc4861 sysctl to a non-zero value.
Perform one of the following:
1) Upgrade your vulnerable system to 6-STABLE, or 7-STABLE, or to the RELENG_7_0, or RELENG_6_3 security branch dated after the correction date.
2) To patch your present system:
The following patches have been verified to apply to FreeBSD 6.3 and 7.0 systems.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
[FreeBSD 6.3]
fetch http://security.FreeBSD.org/patches/SA-08:10/nd6-6.patch
fetch http://security.FreeBSD.org/patches/SA-08:10/nd6-6.patch.asc
[FreeBSD 7.0]
fetch http://security.FreeBSD.org/patches/SA-08:10/nd6-7.patch
fetch http://security.FreeBSD.org/patches/SA-08:10/nd6-7.patch.asc
b) Apply the patch.
cd /usr/src
patch < /path/to/patch
c) Recompile your kernel as described in and reboot the system.
VI. Correction details
The following list contains the revision numbers of each file that was corrected in FreeBSD.
Branch Revision Path
RELENG_6 src/sys/netinet6/in6.h 1.36.2.10 src/sys/netinet6/in6_proto.c 1.32.2.10 src/sys/netinet6/nd6.h 1.19.2.4 src/sys/netinet6/nd6_nbr.c 1.29.2.11 RELENG_6_3 src/UPDATING 1.416.2.37.2.10 src/sys/conf/newvers.sh 1.69.2.15.2.9 src/sys/netinet6/in6.h 1.36.2.8.2.1 src/sys/netinet6/in6_proto.c 1.32.2.8.2.1 src/sys/netinet6/nd6.h 1.19.2.2.6.1 src/sys/netinet6/nd6_nbr.c 1.29.2.9.2.1 RELENG_7 src/sys/netinet6/in6.h 1.51.2.2 src/sys/netinet6/in6_proto.c 1.46.2.3 src/sys/netinet6/nd6.h 1.21.2.2 src/sys/netinet6/nd6_nbr.c 1.47.2.3 RELENG_7_0 src/UPDATING 1.507.2.3.2.9 src/sys/conf/newvers.sh 1.72.2.5.2.9 src/sys/netinet6/in6.h 1.51.4.1 src/sys/netinet6/in6_proto.c 1.46.4.1 src/sys/netinet6/nd6.h 1.21.4.1 src/sys/netinet6/nd6_nbr.c 1.47.4.1
VII. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01662367 Version: 1
HPSBUX02407 SSRT080107 rev.1 - HP-UX Running IPv6, Remote Denial of Service (DoS) and Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2009-02-02 Last Updated: 2009-02-02
Potential Security Impact: Remote Denial of Service (DoS) and unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX running IPv6. This vulnerability could be exploited remotely resulting in a Denial of Service (DoS) and unauthorized access.
References: CVE-2008-2476, CVE-2008-4404
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running IPv6
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2008-2476 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2008-4404 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =============================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.
RESOLUTION
HP has provided the following software patches to resolve the vulnerabilities.
The patches are available for download from: http://itrc.hp.com
HP-UX Release - B.11.11 (11i v1) Patch ID - PHNE_37898
HP-UX Release - B.11.23 (11i v2) Patch ID - PHNE_37897
HP-UX Release - B.11.31 (11i v3) Patch ID - PHNE_38680
MANUAL ACTIONS: No
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.11
Networking.NET-KRN Networking.NET-PRG Networking.NET-RUN Networking.NET-RUN-64 OS-Core.CORE-KRN ProgSupport.C-INC Networking.NET2-KRN Networking.NMS2-KRN OS-Core.CORE2-KRN OS-Core.SYS-ADMIN Networking.NET2-KRN Networking.NMS2-KRN OS-Core.CORE2-KRN OS-Core.SYS-ADMIN action: install patch PHNE_37898 or subsequent URL: http://itrc.hp.com
HP-UX B.11.23
Networking.NET-PRG Networking.NET-RUN ProgSupport.C-INC Networking.NET-RUN-64 Networking.NET2-KRN Networking.NET2-RUN Networking.NMS2-KRN OS-Core.CORE2-KRN OS-Core.SYS2-ADMIN Networking.NET-RUN-64 Networking.NET2-KRN Networking.NET2-RUN Networking.NMS2-KRN OS-Core.CORE2-KRN OS-Core.SYS2-ADMIN action: install patch PHNE_37897 or subsequent URL: http://itrc.hp.com
HP-UX B.11.31
Networking.NET-RUN ProgSupport.C-INC Networking.NET-RUN-64 Networking.NET2-KRN Networking.NET2-RUN Networking.NMS2-KRN OS-Core.CORE2-KRN OS-Core.SYS2-ADMIN Networking.NET-RUN-64 Networking.NET2-KRN Networking.NET2-RUN Networking.NMS2-KRN OS-Core.CORE2-KRN OS-Core.SYS2-ADMIN action: install patch PHNE_38680 or subsequent URL: http://itrc.hp.com
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 2 February 2009 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
\xa9Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: PGP 8.1
iQA/AwUBSYdFsuAfOvwtKn1ZEQK0VACeIKetdQfBDsssaZYXnerHz8AEwzEAn2iy saLPK+/sw3/02JA+b0HuzPfv =HTAW -----END PGP SIGNATURE-----
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 1.9,
"vendor": "freebsd",
"version": "6.3"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 1.6,
"vendor": "freebsd",
"version": "7.1"
},
{
"_id": null,
"model": "openbsd",
"scope": "eq",
"trust": 1.3,
"vendor": "openbsd",
"version": "4.3"
},
{
"_id": null,
"model": "openbsd",
"scope": "eq",
"trust": 1.3,
"vendor": "openbsd",
"version": "4.2"
},
{
"_id": null,
"model": "vxworks",
"scope": "eq",
"trust": 1.0,
"vendor": "windriver",
"version": "5.5"
},
{
"_id": null,
"model": "vxworks",
"scope": "lte",
"trust": 1.0,
"vendor": "windriver",
"version": "6.4"
},
{
"_id": null,
"model": "ftos",
"scope": "eq",
"trust": 1.0,
"vendor": "force10",
"version": "*"
},
{
"_id": null,
"model": "vxworks",
"scope": "eq",
"trust": 1.0,
"vendor": "windriver",
"version": "5"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 1.0,
"vendor": "netbsd",
"version": "*"
},
{
"_id": null,
"model": "jnos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple computer",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "extreme",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "force10",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "freebsd",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ibm zseries",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "netbsd",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "openbsd",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "wind river",
"version": null
},
{
"_id": null,
"model": "airmac express",
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"_id": null,
"model": "airmac extreme",
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"_id": null,
"model": "time capsule",
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"_id": null,
"model": "ax2000r series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax3600s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax5400s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax6300s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax6700s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax7700r series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax7800r series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax7800s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "seil/neu",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "128 2.45"
},
{
"_id": null,
"model": "seil/neu",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "2fe plus 1.94"
},
{
"_id": null,
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.94"
},
{
"_id": null,
"model": "seil/x1,x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.32"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.11"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.23"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.31"
},
{
"_id": null,
"model": "fitelnet-f series",
"scope": "eq",
"trust": 0.8,
"vendor": "furukawa electric",
"version": "fitelnet-f80/f100/f120/f140/f1000/f2000/f3000"
},
{
"_id": null,
"model": "ip8800/s,/r",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"_id": null,
"model": "gr2000",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "none"
},
{
"_id": null,
"model": "gr2000",
"scope": "eq",
"trust": 0.8,
"vendor": "hitachi",
"version": "(b_model)"
},
{
"_id": null,
"model": "gr4000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"_id": null,
"model": "gs3000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"_id": null,
"model": "gs4000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"_id": null,
"model": "ipcom series",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "switch sr-s series",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "router si-r series",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "river systems vxworks",
"scope": "eq",
"trust": 0.3,
"vendor": "wind",
"version": "6.4"
},
{
"_id": null,
"model": "river systems vxworks",
"scope": "eq",
"trust": 0.3,
"vendor": "wind",
"version": "5"
},
{
"_id": null,
"model": "openbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "openbsd",
"version": "4.4"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "3.0.2"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "3.0.1"
},
{
"_id": null,
"model": "current",
"scope": null,
"trust": 0.3,
"vendor": "netbsd",
"version": null
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "4.0"
},
{
"_id": null,
"model": "3.1 rc3",
"scope": null,
"trust": 0.3,
"vendor": "netbsd",
"version": null
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "netbsd",
"version": "3.1"
},
{
"_id": null,
"model": "3,1 rc1",
"scope": null,
"trust": 0.3,
"vendor": "netbsd",
"version": null
},
{
"_id": null,
"model": "financials server",
"scope": "eq",
"trust": 0.3,
"vendor": "navision",
"version": "3.0"
},
{
"_id": null,
"model": "midnightbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "midnightbsd",
"version": "0.2.1"
},
{
"_id": null,
"model": "midnightbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "midnightbsd",
"version": "0.1.1"
},
{
"_id": null,
"model": "midnightbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "midnightbsd",
"version": "0.3"
},
{
"_id": null,
"model": "midnightbsd",
"scope": "eq",
"trust": 0.3,
"vendor": "midnightbsd",
"version": "0.1"
},
{
"_id": null,
"model": "networks wxc series",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "0"
},
{
"_id": null,
"model": "networks wx series",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "0"
},
{
"_id": null,
"model": "networks session and resource control appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "2.0"
},
{
"_id": null,
"model": "networks session and resource control appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "1.0"
},
{
"_id": null,
"model": "networks secure access",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "7000"
},
{
"_id": null,
"model": "networks secure access sp",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "60006000"
},
{
"_id": null,
"model": "networks secure access",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "600050000"
},
{
"_id": null,
"model": "networks secure access",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "400030000"
},
{
"_id": null,
"model": "networks secure access",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "20000"
},
{
"_id": null,
"model": "networks ive os",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6.0"
},
{
"_id": null,
"model": "networks ive os",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.0"
},
{
"_id": null,
"model": "networks ive os",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "4.0"
},
{
"_id": null,
"model": "networks ive os",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "3.0"
},
{
"_id": null,
"model": "networks ive os",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "2.0"
},
{
"_id": null,
"model": "networks ive os",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "1.0"
},
{
"_id": null,
"model": "networks infranet controller",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "6000"
},
{
"_id": null,
"model": "networks infranet controller",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "4000"
},
{
"_id": null,
"model": "networks idp",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "4.0"
},
{
"_id": null,
"model": "networks dxos",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "5.0"
},
{
"_id": null,
"model": "z/os",
"scope": null,
"trust": 0.3,
"vendor": "ibm",
"version": null
},
{
"_id": null,
"model": "hp-ux b.11.31",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "hp-ux b.11.23",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "hp-ux b.11.11",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "hp-ux 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "v3"
},
{
"_id": null,
"model": "hp-ux 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "v2"
},
{
"_id": null,
"model": "hp-ux 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "v1"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.0.x"
},
{
"_id": null,
"model": "-stable",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.0"
},
{
"_id": null,
"model": "-release",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.0"
},
{
"_id": null,
"model": "-release-p1",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "7.1"
},
{
"_id": null,
"model": "7.0-stable",
"scope": null,
"trust": 0.3,
"vendor": "freebsd",
"version": null
},
{
"_id": null,
"model": "7.0-release",
"scope": null,
"trust": 0.3,
"vendor": "freebsd",
"version": null
},
{
"_id": null,
"model": "beta4",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "7.0"
},
{
"_id": null,
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "7.0"
},
{
"_id": null,
"model": "-prerelease",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "7.0"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "7.0"
},
{
"_id": null,
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.3"
},
{
"_id": null,
"model": "-stable",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.2"
},
{
"_id": null,
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.2"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.2"
},
{
"_id": null,
"model": "-stable",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.1"
},
{
"_id": null,
"model": "-release-p10",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.1"
},
{
"_id": null,
"model": "-release",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.1"
},
{
"_id": null,
"model": "-release-p5",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "6.0"
},
{
"_id": null,
"model": "networks ftos",
"scope": "eq",
"trust": 0.3,
"vendor": "force10",
"version": "7.7.11"
},
{
"_id": null,
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.0"
},
{
"_id": null,
"model": "airport extreme base station",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"_id": null,
"model": "airport express",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.3"
},
{
"_id": null,
"model": "airport express",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.1"
},
{
"_id": null,
"model": "airport base station",
"scope": null,
"trust": 0.3,
"vendor": "apple",
"version": null
},
{
"_id": null,
"model": "time capsule",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "7.4.1"
},
{
"_id": null,
"model": "airport extreme base station with 802.11n",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "7.4.1"
},
{
"_id": null,
"model": "airport express base station with 802.11n",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "7.4.1"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#472363"
},
{
"db": "BID",
"id": "31529"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-024"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001801"
},
{
"db": "NVD",
"id": "CVE-2008-2476"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:apple:airport_express",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:apple:airmac_extreme",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apple:time_capsule",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax2000r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax3600s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax5400s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax6300s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax6700s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7700r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7800r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7800s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:hp:hp-ux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:furukawa_electric:fitelnet-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:nec:ip8800_s_r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gr2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gr4000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gs3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gs4000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:ipcom",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:switch_sr-s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:router_si-r",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001801"
}
]
},
"credits": {
"_id": null,
"data": "David Miles reported this issue.",
"sources": [
{
"db": "BID",
"id": "31529"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-024"
}
],
"trust": 0.9
},
"cve": "CVE-2008-2476",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2008-2476",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-32601",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2008-2476",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#472363",
"trust": 0.8,
"value": "2.70"
},
{
"author": "NVD",
"id": "CVE-2008-2476",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200810-024",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-32601",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#472363"
},
{
"db": "VULHUB",
"id": "VHN-32601"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-024"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001801"
},
{
"db": "NVD",
"id": "CVE-2008-2476"
}
]
},
"description": {
"_id": null,
"data": "The IPv6 Neighbor Discovery Protocol (NDP) implementation in (1) FreeBSD 6.3 through 7.1, (2) OpenBSD 4.2 and 4.3, (3) NetBSD, (4) Force10 FTOS before E7.7.1.1, (5) Juniper JUNOS, and (6) Wind River VxWorks 5.x through 6.4 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity) or read private network traffic via a spoofed message that modifies the Forward Information Base (FIB). A vulnerability in some implementations of the IPv6 Neighbor Discovery Protocol may allow a nearby attacker to intercept traffic or cause congested links to become overloaded. This false information can modify the Forward Information Base (FIB). Operating systems affected by the vulnerability: Wind River Systems VxWorks 6.4 Wind River Systems VxWorks 5 OpenBSD OpenBSD 4.4 OpenBSD OpenBSD 4.3 OpenBSD OpenBSD 4.2 NetBSD NetBSD 3.0.2 NetBSD NetBSD 3.0.1 NetBSD NetBSD Current NetBSD NetBSD 4.0 NetBSD NetBSD 3.1_RC3 NetBSD NetBSD 3.1 NetBSD NetBSD 3.1 NetBSD NetBSD 3,1_RC1 Navision Financials Server 3.0 MidnightBSD MidnightBSD 0.2.1 MidnightBSD MidnightBSD 0.1.1 MidnightBSD MidnightBSD 0.3 MidnightBSD MidnightBSD 0.1 Juniper Networks WXC Series 0 Juniper Networks WX Series 0 Juniper Networks Session and Resource Control Appliance 2.0 Juniper Networks Session and Resource Control Appliance 1. ----------------------------------------------------------------------\n\nDid you know that a change in our assessment rating, exploit code\navailability, or if an updated patch is released by the vendor, is\nnot part of this mailing-list?\n\nClick here to learn more:\nhttp://secunia.com/advisories/business_solutions/\n\n----------------------------------------------------------------------\n\nTITLE:\nHP-UX IPv6 Neighbor Discovery Protocol Neighbor Solicitation\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA33787\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/33787/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSpoofing, Exposure of sensitive information, DoS\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nHP-UX 11.x\nhttp://secunia.com/advisories/product/138/\n\nDESCRIPTION:\nA vulnerability has been reported in HP-UX, which can be exploited by\nmalicious people to conduct spoofing attacks, disclose potentially\nsensitive information, or to cause a DoS (Denial of Service). \n\nThis is related to:\nSA32112\n\nThe vulnerability is reported in HP-UX B.11.11, B.11.23, and B.11.31\nrunning IPv6. \n\nSOLUTION:\nApply patches. \n\nHP-UX B.11.11:\nInstall patch PHNE_37898 or subsequent. \n\nHP-UX B.11.23:\nInstall patch PHNE_37897 or subsequent. \n\nHP-UX B.11.31:\nInstall patch PHNE_38680 or subsequent. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nHPSBUX02407 SSRT080107:\nhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662367\n\nOTHER REFERENCES:\nSA32112:\nhttp://secunia.com/advisories/32112/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Vendor affected: TP-Link (http://tp-link.com)\n\nProducts affected:\n * All TP-Link VxWorks-based devices (confirmed by vendor)\n * All \"2-series\" switches (confirmed by vendor)\n * TL-SG2008 semi-managed switch (confirmed by vendor)\n * TL-SG2216 semi-managed switch (confirmed by vendor)\n * TL-SG2424 semi-managed switch (confirmed by vendor)\n * TL-SG2424P semi-managed switch (confirmed by vendor)\n * TL-SG2452 semi-managed switch (confirmed by vendor)\n\nVulnerabilities:\n * All previously-reported VxWorks vulnerabilities from 6.6.0 on;\n at the very least:\n * CVE-2013-0716 (confirmed by vendor)\n * CVE-2013-0715 (confirmed by vendor)\n * CVE-2013-0714 (confirmed by vendor)\n * CVE-2013-0713 (confirmed by vendor)\n * CVE-2013-0712 (confirmed by vendor)\n * CVE-2013-0711 (confirmed by vendor)\n * CVE-2010-2967 (confirmed by vendor)\n * CVE-2010-2966 (confirmed by vendor)\n * CVE-2008-2476 (confirmed by vendor)\n * SSLv2 is available and cannot be disabled unless HTTPS is\n completely disabled (allows downgrade attacks)\n (confirmed by vendor)\n * SSL (v2, v3) offers insecure cipher suites and HMACs which cannot\n be disabled (allows downgrade attacks)\n (confirmed by vendor)\n\nDesign flaws:\n * Telnet is available and cannot be disabled (confirmed by vendor)\n * SSHv1 enabled by default if SSH is enabled (confirmed by vendor)\n\nVendor response:\n TP-Link are not convinced that these flaws should be repaired. \n\n TP-Link\u0027s Internet presence -- or at least DNS -- is available only\n intermittently. Most emails bounced. Lost contact with vendor, but\n did confirm that development lead is now on holiday and will not\n return for at least a week. \n\n Initial vendor reaction was to recommend purchase of \"3-series\"\n switches. Vendor did not offer reasons why \"3-series\" switches would\n be more secure, apart from lack of telnet service. Vendor confirmed\n that no development time can be allocated to securing \"2-series\"\n product and all focus has shifted to newer products. \n\n (TL-SG2008 first product availability July 2014...)\n\n Vendor deeply confused about security of DES/3DES, MD5, claimed that\n all security is relative. (\"...[E]ven SHA-1 can be cracked, they just\n have different security level.\")\n\nFix availability:\n None. \n\nWork-arounds advised:\n None possible. Remove products from network. \nCorrected: 2008-10-01 00:32:59 UTC (RELENG_7, 7.1-PRERELEASE)\n 2008-10-01 00:32:59 UTC (RELENG_7_0, 7.0-RELEASE-p5)\n 2008-10-01 00:32:59 UTC (RELENG_6, 6.4-PRERELEASE)\n 2008-10-01 00:32:59 UTC (RELENG_6_3, 6.3-RELEASE-p5)\nCVE Name: CVE-2008-2476\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:http://security.FreeBSD.org/\u003e. \n\nI. Background\n\nIPv6 nodes use the Neighbor Discovery protocol to determine the link-layer\naddress of other nodes, find routers, and maintain reachability information. \nThe Neighbor Discovery protocol uses Neighbor Solicitation (ICMPv6 type 135)\nto query target nodes for their link-layer addresses. \n\nII. Problem Description\n\nIPv6 routers may allow \"on-link\" IPv6 nodes to create and update the\nrouter\u0027s neighbor cache and forwarding information. A malicious IPv6 node\nsharing a common router but on a different physical segment from another\nnode may be able to spoof Neighbor Discovery messages, allowing it to update\nrouter information for the victim node. \n\nIII. Impact\n\nAn attacker on a different physical network connected to the same IPv6\nrouter as another node could redirect IPv6 traffic intended for that node. \n\nIV. Workaround\n\nFirewall packet filters can be used to filter incoming Neighbor\nSolicitation messages but may interfere with normal IPv6 operation if not\nconfigured carefully. \n\nReverse path forwarding checks could be used to make gateways, such as\nrouters or firewalls, drop Neighbor Solicitation messages from\nnodes with unexpected source addresses on a particular interface. \n\nV. Solution\n\nNOTE WELL: The solution described below causes IPv6 Neighbor Discovery\nNeighbor Solicitation messages from non-neighbors to be ignored. \nThis can be re-enabled if required by setting the newly added\nnet.inet6.icmp6.nd6_onlink_ns_rfc4861 sysctl to a non-zero value. \n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to 6-STABLE, or 7-STABLE, or to the\nRELENG_7_0, or RELENG_6_3 security branch dated after the correction\ndate. \n\n2) To patch your present system:\n\nThe following patches have been verified to apply to FreeBSD 6.3 and\n7.0 systems. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 6.3]\n# fetch http://security.FreeBSD.org/patches/SA-08:10/nd6-6.patch\n# fetch http://security.FreeBSD.org/patches/SA-08:10/nd6-6.patch.asc\n\n[FreeBSD 7.0]\n# fetch http://security.FreeBSD.org/patches/SA-08:10/nd6-7.patch\n# fetch http://security.FreeBSD.org/patches/SA-08:10/nd6-7.patch.asc\n\nb) Apply the patch. \n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile your kernel as described in\n\u003cURL:http://www.FreeBSD.org/handbook/kernelconfig.html\u003e and reboot the\nsystem. \n\nVI. Correction details\n\nThe following list contains the revision numbers of each file that was\ncorrected in FreeBSD. \n\nBranch Revision\n Path\n- -------------------------------------------------------------------------\nRELENG_6\n src/sys/netinet6/in6.h 1.36.2.10\n src/sys/netinet6/in6_proto.c 1.32.2.10\n src/sys/netinet6/nd6.h 1.19.2.4\n src/sys/netinet6/nd6_nbr.c 1.29.2.11\nRELENG_6_3\n src/UPDATING 1.416.2.37.2.10\n src/sys/conf/newvers.sh 1.69.2.15.2.9\n src/sys/netinet6/in6.h 1.36.2.8.2.1\n src/sys/netinet6/in6_proto.c 1.32.2.8.2.1\n src/sys/netinet6/nd6.h 1.19.2.2.6.1\n src/sys/netinet6/nd6_nbr.c 1.29.2.9.2.1\nRELENG_7\n src/sys/netinet6/in6.h 1.51.2.2\n src/sys/netinet6/in6_proto.c 1.46.2.3\n src/sys/netinet6/nd6.h 1.21.2.2\n src/sys/netinet6/nd6_nbr.c 1.47.2.3\nRELENG_7_0\n src/UPDATING 1.507.2.3.2.9\n src/sys/conf/newvers.sh 1.72.2.5.2.9\n src/sys/netinet6/in6.h 1.51.4.1\n src/sys/netinet6/in6_proto.c 1.46.4.1\n src/sys/netinet6/nd6.h 1.21.4.1\n src/sys/netinet6/nd6_nbr.c 1.47.4.1\n- -------------------------------------------------------------------------\n\nVII. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c01662367\nVersion: 1\n\nHPSBUX02407 SSRT080107 rev.1 - HP-UX Running IPv6, Remote Denial of Service (DoS) and Unauthorized Access\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2009-02-02\nLast Updated: 2009-02-02\n\nPotential Security Impact: Remote Denial of Service (DoS) and unauthorized access\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP-UX running IPv6. This vulnerability could be exploited remotely resulting in a Denial of Service (DoS) and unauthorized access. \n\nReferences: CVE-2008-2476, CVE-2008-4404\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.11, B.11.23, B.11.31 running IPv6\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics \n===============================================\nReference Base Vector Base Score \nCVE-2008-2476 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2008-4404 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===============================================\nInformation on CVSS is documented in HP Customer Notice: HPSN-2008-002. \n \nRESOLUTION\n\nHP has provided the following software patches to resolve the vulnerabilities. \n\nThe patches are available for download from: http://itrc.hp.com \n \nHP-UX Release - B.11.11 (11i v1)\nPatch ID - PHNE_37898\n \nHP-UX Release - B.11.23 (11i v2)\nPatch ID - PHNE_37897\n \nHP-UX Release - B.11.31 (11i v3)\nPatch ID - PHNE_38680\n\nMANUAL ACTIONS: No \n\nPRODUCT SPECIFIC INFORMATION \n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa \n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS \n\nHP-UX B.11.11 \n============= \nNetworking.NET-KRN \nNetworking.NET-PRG \nNetworking.NET-RUN \nNetworking.NET-RUN-64 \nOS-Core.CORE-KRN \nProgSupport.C-INC \nNetworking.NET2-KRN \nNetworking.NMS2-KRN \nOS-Core.CORE2-KRN \nOS-Core.SYS-ADMIN \nNetworking.NET2-KRN \nNetworking.NMS2-KRN \nOS-Core.CORE2-KRN \nOS-Core.SYS-ADMIN \naction: install patch PHNE_37898 or subsequent \nURL: http://itrc.hp.com \n\nHP-UX B.11.23 \n============= \nNetworking.NET-PRG \nNetworking.NET-RUN \nProgSupport.C-INC \nNetworking.NET-RUN-64 \nNetworking.NET2-KRN \nNetworking.NET2-RUN \nNetworking.NMS2-KRN \nOS-Core.CORE2-KRN \nOS-Core.SYS2-ADMIN \nNetworking.NET-RUN-64 \nNetworking.NET2-KRN \nNetworking.NET2-RUN \nNetworking.NMS2-KRN \nOS-Core.CORE2-KRN \nOS-Core.SYS2-ADMIN \naction: install patch PHNE_37897 or subsequent \nURL: http://itrc.hp.com \n\nHP-UX B.11.31 \n============= \nNetworking.NET-RUN \nProgSupport.C-INC \nNetworking.NET-RUN-64 \nNetworking.NET2-KRN \nNetworking.NET2-RUN \nNetworking.NMS2-KRN \nOS-Core.CORE2-KRN \nOS-Core.SYS2-ADMIN \nNetworking.NET-RUN-64 \nNetworking.NET2-KRN \nNetworking.NET2-RUN \nNetworking.NMS2-KRN \nOS-Core.CORE2-KRN \nOS-Core.SYS2-ADMIN \naction: install patch PHNE_38680 or subsequent \nURL: http://itrc.hp.com \n\nEND AFFECTED VERSIONS \n\nHISTORY \nVersion:1 (rev.1) - 2 February 2009 Initial release \n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\n\n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com \nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com \n Subject: get key\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email: \nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC \nOn the web page: ITRC security bulletins and patch sign-up \nUnder Step1: your ITRC security bulletins and patches \n - check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems \n - verify your operating system selections are checked and save. \n\n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php \nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do \n\n\n* The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: \n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n \nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\n\\xa9Copyright 2009 Hewlett-Packard Development Company, L.P. \n\nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 8.1\n\niQA/AwUBSYdFsuAfOvwtKn1ZEQK0VACeIKetdQfBDsssaZYXnerHz8AEwzEAn2iy\nsaLPK+/sw3/02JA+b0HuzPfv\n=HTAW\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-2476"
},
{
"db": "CERT/CC",
"id": "VU#472363"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001801"
},
{
"db": "BID",
"id": "31529"
},
{
"db": "VULHUB",
"id": "VHN-32601"
},
{
"db": "PACKETSTORM",
"id": "74623"
},
{
"db": "PACKETSTORM",
"id": "128512"
},
{
"db": "PACKETSTORM",
"id": "70564"
},
{
"db": "PACKETSTORM",
"id": "74584"
}
],
"trust": 3.06
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-32601",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-32601"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#472363",
"trust": 3.7
},
{
"db": "NVD",
"id": "CVE-2008-2476",
"trust": 3.1
},
{
"db": "BID",
"id": "31529",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "32116",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "32406",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "32117",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "32112",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2752",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2750",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2751",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2009-0633",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1021132",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020968",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1021109",
"trust": 1.7
},
{
"db": "XF",
"id": "45601",
"trust": 1.4
},
{
"db": "SECUNIA",
"id": "32133",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "33787",
"trust": 0.9
},
{
"db": "VUPEN",
"id": "ADV-2009-0312",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001801",
"trust": 0.8
},
{
"db": "OVAL",
"id": "OVAL:ORG.MITRE.OVAL:DEF:5670",
"trust": 0.6
},
{
"db": "OPENBSD",
"id": "[4.2] 015: SECURITY FIX: OCTOBER 2, 2008",
"trust": 0.6
},
{
"db": "OPENBSD",
"id": "[4.3] 006: SECURITY FIX: OCTOBER 2, 2008",
"trust": 0.6
},
{
"db": "NETBSD",
"id": "NETBSD-SA2008-013",
"trust": 0.6
},
{
"db": "FREEBSD",
"id": "FREEBSD-SA-08:10",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200810-024",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "70564",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "128512",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "74584",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-32601",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "74623",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#472363"
},
{
"db": "VULHUB",
"id": "VHN-32601"
},
{
"db": "BID",
"id": "31529"
},
{
"db": "PACKETSTORM",
"id": "74623"
},
{
"db": "PACKETSTORM",
"id": "128512"
},
{
"db": "PACKETSTORM",
"id": "70564"
},
{
"db": "PACKETSTORM",
"id": "74584"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-024"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001801"
},
{
"db": "NVD",
"id": "CVE-2008-2476"
}
]
},
"id": "VAR-200810-0004",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-32601"
}
],
"trust": 0.47650790500000006
},
"last_update_date": "2026-03-09T22:15:21.078000Z",
"patch": {
"_id": null,
"data": [
{
"title": "HT3467",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3467"
},
{
"title": "HT3467",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3467?viewlocale=ja_JP"
},
{
"title": "20081003",
"trust": 0.8,
"url": "http://www.furukawa.co.jp/fitelnet/topic/vulnera_20081003.html"
},
{
"title": "HPSBUX02407",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01662367"
},
{
"title": "NV08-011",
"trust": 0.8,
"url": "http://www.nec.co.jp/security-info/secinfo/nv08-011.html"
},
{
"title": "10031541",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2008/10031541.php"
},
{
"title": "AX-VU2008-04",
"trust": 0.8,
"url": "http://www.alaxala.com/jp/support/security/20081003.html"
},
{
"title": "IPv6ND",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/network/notice/IPv6ND.html"
},
{
"title": "VU#472363",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/vu472363.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001801"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-32601"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001801"
},
{
"db": "NVD",
"id": "CVE-2008-2476"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 3.2,
"url": "http://www.kb.cert.org/vuls/id/472363"
},
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/31529"
},
{
"trust": 2.0,
"url": "http://support.apple.com/kb/ht3467"
},
{
"trust": 1.8,
"url": "http://security.freebsd.org/advisories/freebsd-sa-08:10.nd6.asc"
},
{
"trust": 1.7,
"url": "http://www.kb.cert.org/vuls/id/mapg-7h2ry7"
},
{
"trust": 1.7,
"url": "http://www.kb.cert.org/vuls/id/mapg-7h2s68"
},
{
"trust": 1.7,
"url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2008-013.txt.asc"
},
{
"trust": 1.7,
"url": "http://www.openbsd.org/errata42.html#015_ndp"
},
{
"trust": 1.7,
"url": "http://www.openbsd.org/errata43.html#006_ndp"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1020968"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1021109"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1021132"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/32112"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/32116"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/32117"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/32406"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2009/0633"
},
{
"trust": 1.6,
"url": "https://www.juniper.net/alerts/viewalert.jsp?actionbtn=search\u0026txtalertnumber=psn-2008-09-036\u0026viewmode=view"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/45601"
},
{
"trust": 1.1,
"url": "http://www.ietf.org/rfc/rfc2461.txt"
},
{
"trust": 1.1,
"url": "http://www.ietf.org/rfc/rfc3756.txt"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5670"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/32133"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/2750"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/2751"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/2752"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45601"
},
{
"trust": 0.9,
"url": "http://secunia.com/advisories/33787/"
},
{
"trust": 0.9,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2476"
},
{
"trust": 0.8,
"url": "http://tools.ietf.org/html/rfc4861"
},
{
"trust": 0.8,
"url": "http://tools.ietf.org/html/rfc4861#section-2.1"
},
{
"trust": 0.8,
"url": "http://www.ietf.org/rfc/rfc3177.txt"
},
{
"trust": 0.8,
"url": "http://tools.ietf.org/html/rfc3971"
},
{
"trust": 0.8,
"url": "http://docs.sun.com/app/docs/doc/817-0573/6mgc65bb6?a=view"
},
{
"trust": 0.8,
"url": "http://msdn.microsoft.com/en-us/library/ms900123.aspx"
},
{
"trust": 0.8,
"url": "http://en.wikipedia.org/wiki/forwarding_information_base#fibs_in_ingress_filtering_against_denial_of_service"
},
{
"trust": 0.8,
"url": "http://en.wikipedia.org/wiki/reverse_path_forwarding"
},
{
"trust": 0.8,
"url": "http://www.openbsd.org/faq/pf/filter.html#antispoof"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu472363/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2476"
},
{
"trust": 0.8,
"url": "http://www.vupen.com/english/advisories/2009/0312"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2752"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2751"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2750"
},
{
"trust": 0.6,
"url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5670"
},
{
"trust": 0.4,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662367"
},
{
"trust": 0.3,
"url": "http://www.midnightbsd.org/"
},
{
"trust": 0.3,
"url": "http://www.openbsd.org/errata43.html#005_ndp"
},
{
"trust": 0.3,
"url": "http://www.openbsd.org/errata42.html#014_ndp"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/elmodocs2/security/asa-2009-059.htm"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/mapg-7h2rzu"
},
{
"trust": 0.3,
"url": "http://www.openbsd.org/errata44.html#001_ndp"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2476"
},
{
"trust": 0.1,
"url": "https://www.juniper.net/alerts/viewalert.jsp?actionbtn=search\u0026amp;txtalertnumber=psn-2008-09-036\u0026amp;viewmode=view"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/32112/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/product/138/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-2966"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0713"
},
{
"trust": 0.1,
"url": "http://tp-link.com)"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0715"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-2967"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0716"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0712"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0711"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0714"
},
{
"trust": 0.1,
"url": "http://security.freebsd.org/patches/sa-08:10/nd6-6.patch.asc"
},
{
"trust": 0.1,
"url": "http://security.freebsd.org/patches/sa-08:10/nd6-6.patch"
},
{
"trust": 0.1,
"url": "http://security.freebsd.org/\u003e."
},
{
"trust": 0.1,
"url": "http://security.freebsd.org/patches/sa-08:10/nd6-7.patch.asc"
},
{
"trust": 0.1,
"url": "http://www.freebsd.org/handbook/kernelconfig.html\u003e"
},
{
"trust": 0.1,
"url": "http://security.freebsd.org/patches/sa-08:10/nd6-7.patch"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4404"
},
{
"trust": 0.1,
"url": "http://www.itrc.hp.com/service/cki/secbullarchive.do"
},
{
"trust": 0.1,
"url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc"
},
{
"trust": 0.1,
"url": "https://www.hp.com/go/swa"
},
{
"trust": 0.1,
"url": "http://itrc.hp.com"
},
{
"trust": 0.1,
"url": "http://h30046.www3.hp.com/subsignin.php"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#472363"
},
{
"db": "VULHUB",
"id": "VHN-32601"
},
{
"db": "BID",
"id": "31529"
},
{
"db": "PACKETSTORM",
"id": "74623"
},
{
"db": "PACKETSTORM",
"id": "128512"
},
{
"db": "PACKETSTORM",
"id": "70564"
},
{
"db": "PACKETSTORM",
"id": "74584"
},
{
"db": "CNNVD",
"id": "CNNVD-200810-024"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001801"
},
{
"db": "NVD",
"id": "CVE-2008-2476"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#472363",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-32601",
"ident": null
},
{
"db": "BID",
"id": "31529",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "74623",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "128512",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "70564",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "74584",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-200810-024",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001801",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2008-2476",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2008-10-02T00:00:00",
"db": "CERT/CC",
"id": "VU#472363",
"ident": null
},
{
"date": "2008-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-32601",
"ident": null
},
{
"date": "2008-10-02T00:00:00",
"db": "BID",
"id": "31529",
"ident": null
},
{
"date": "2009-02-03T17:55:30",
"db": "PACKETSTORM",
"id": "74623",
"ident": null
},
{
"date": "2014-10-01T10:11:11",
"db": "PACKETSTORM",
"id": "128512",
"ident": null
},
{
"date": "2008-10-02T21:27:21",
"db": "PACKETSTORM",
"id": "70564",
"ident": null
},
{
"date": "2009-02-03T20:58:57",
"db": "PACKETSTORM",
"id": "74584",
"ident": null
},
{
"date": "2008-10-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200810-024",
"ident": null
},
{
"date": "2008-11-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001801",
"ident": null
},
{
"date": "2008-10-03T15:07:10.727000",
"db": "NVD",
"id": "CVE-2008-2476",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2009-04-27T00:00:00",
"db": "CERT/CC",
"id": "VU#472363",
"ident": null
},
{
"date": "2017-09-29T00:00:00",
"db": "VULHUB",
"id": "VHN-32601",
"ident": null
},
{
"date": "2015-03-19T09:41:00",
"db": "BID",
"id": "31529",
"ident": null
},
{
"date": "2009-03-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200810-024",
"ident": null
},
{
"date": "2010-03-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001801",
"ident": null
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2008-2476",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200810-024"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "IPv6 implementations insecurely update Forwarding Information Base",
"sources": [
{
"db": "CERT/CC",
"id": "VU#472363"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200810-024"
}
],
"trust": 0.6
}
}
VAR-200411-0172
Vulnerability from variot - Updated: 2026-03-09 20:53The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference. OpenSSL Is SSL/TLS Due to incomplete implementation of do_change_cipher_spec() In the function NULL A vulnerability exists where pointers are not handled properly.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. OpenSSL is an open source SSL implementation used to implement high-strength encryption of network communications. It is now widely used in various network applications.
Using the Codenomicon TLS test tool, OpenSSL found a NULL pointer allocation in the do_change_cipher_spec () function. Applications that rely on this library will generate a denial of service. For the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. The second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. This entry will be retired when individual BID records are created for each issue. *Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Multiple security vulnerabilities are reported to affect Apple Mac OS X; updates are available. Apache is prone to five vulnerabilities ranging from buffer overflows to access validation vulnerabilities. The CVE Mitre candidate IDs CAN-2005-1344, CAN-2004-0942, CAN-2004-0885, CAN-2004-1083, and CAN-2004-1084 are assigned to these issues. Appkit is prone to three vulnerabilities. Two of these could result in arbitrary code execution, the third could permit the creation of local accounts. The CVE Mitre candidate IDs CAN-2005-2501, CAN-2005-2502, and CAN-2005-2503 are assigned to these issues. Bluetooth is prone to a vulnerability regarding authentication bypass. The CVE Mitre candidate ID CAN-2005-2504 is assigned to this issue. CoreFoundation is prone to two vulnerabilities, one resulting in a buffer overflow, the other a denial-of-service vulnerability. The CVE Mitre candidate IDs CAN-2005-2505 and CAN-2005-2506 are assigned to these issues. CUPS is prone to two vulnerabilities resulting in a denial of service until the service can be restarted. The CVE Mitre candidate IDs CAN-2005-2525 and CAN-2005-2526 are assigned to these issues. Directory Services is prone to three vulnerabilities. These issues vary from buffer overflow, unauthorized account creation and deletion, and privilege escalation. The CVE Mitre candidate IDs CAN-2005-2507, CAN-2005-2508 and CAN-2005-2519 are assigned to these issues. HItoolbox is prone to a vulnerability that could result in information disclosure. The CVE Mitre candidate ID CAN-2005-2513 is assigned to this issue. Kerberos is prone to five vulnerabilities that may result in a buffer overflow, execution of arbitrary code, and root compromise. The CVE Mitre candidate IDs CAN-2004-1189, CAN-2005-1174, CAN-2005-1175, CAN-2005-1689, and CAN-2005-2511 are assigned to these issues. loginwindow is prone to a vulnerability that could permit a user to gain access to other logged-in accounts. The CVE Mitre candidate ID CAN-2005-2509 is assigned to this issue. Mail is prone to a vulnerability regarding the loss of privacy when remote images are loaded into HTML email. The CVE Mitre candidate ID CAN-2005-2512 is assigned to this issue. MySQL is prone to three vulnerabilities that include arbitrary code execution by remote authenticated users. The CVE Mitre candidate IDs CAN-2005-0709, CAN-2005-0710, and CAN-2005-0711 are assigned to these issues. The CVE Mitre candidate IDs CAN-2004-0079 and CAN-2004-0112 are assigned to these issues. ping is prone to a vulnerability that could allow local privilege escalation and arbitrary code execution. The CVE Mitre candidate ID CAN-2005-2514 is assigned to this issue. QuartzComposerScreenSaver is prone to a vulnerability that could allow users to open pages while the RSS Visualizer screen is locked. The CVE Mitre candidate ID CAN-2005-2515 is assigned to this issue. Safari is prone to two vulnerabilities that could result in arbitrary command execution or have information submitted to an incorrect site. The CVE Mitre candidate IDs CAN-2005-2516 and CAN-2005-2517 are assigned to these issues. SecurityInterface is prone to a vulnerability that could expose recently used passwords. The CVE Mitre candidate ID CAN-2005-2520 is assigned to this issue. servermgrd is prone to a buffer-overflow vulnerability that could ultimately lead to the execution of arbitrary code. The CVE Mitre candidate ID CAN-2005-2518 is assigned to this issue. servermgr_ipfilter is prone to a vulnerability regarding firewall settings not always being written to the Active Rules. The CVE Mitre candidate ID CAN-2005-2510 is assigned to this issue. SquirrelMail is prone to two vulnerabilities including a cross-site scripting issue. The CVE Mitre candidate IDs CAN-2005-1769 and CAN-2005-2095 are assigned to these issues. traceroute is prone to a vulnerability that could result in arbitrary code execution and privilege escalation. The CVE Mitre candidate ID CAN-2005-2521 is assigned to this issue. WebKit is affected by a vulnerability that could result in code execution regarding a malformed PDF file. The CVE Mitre candidate ID CAN-2005-2522 is assigned to this issue. Weblog Server is prone to multiple cross-site scripting vulnerabilities. The CVE Mitre candidate ID CAN-2005-2523 is assigned to this issue. X11 is prone to a vulnerability that could result in arbitrary code execution. The CVE Mitre candidate ID CAN-2005-0605 is assigned to this issue. zlib is prone to two denial-of-service vulnerabilities that may ultimately lead to arbitrary code execution. The CVE Mitre candidate IDs CAN-2005-2096 and CAN-2005-1849 are assigned to these issues. These vulnerabilities will be separated into individual BIDs upon further analysis of the issues. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. Oracle has released a Critical Patch Update to address these issues in various supported applications and platforms. The issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. This BID will be divided and updated into separate BIDs when more information is available. It supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, security hashing algorithm, etc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Cisco Security Advisory: Cisco OpenSSL Implementation Vulnerability
Revision 1.0
For Public Release 2004 March 17 at 1300 UTC (GMT)
----------------------------------------------------------------------
Contents
Summary
Affected Products
Details
Impact
Software Versions and Fixes
Obtaining Fixed Software
Workarounds
Exploitation and Public Announcements
Status of This Notice: INTERIM
Distribution
Revision History
Cisco Security Procedures
----------------------------------------------------------------------
Summary
A new vulnerability in the OpenSSL implementation for SSL has been announced on March 17, 2004.
An affected network device running an SSL server based on an affected OpenSSL implementation may be vulnerable to a Denial of Service (DoS) attack. There are workarounds available to mitigate the effects of this vulnerability on Cisco products in the workaround section of this advisory. Cisco is providing fixed software, and recommends that customers upgrade to it when it is available.
This advisory will be posted at http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml.
* Cisco IOS 12.1(11)E and later in the 12.1E release train. Only crypto
images (56i and k2) are vulnerable for the Cisco 7100 and 7200 Series
Routers.
* Cisco IOS 12.2SY release train. Only crypto images (k8, k9 and k91)
are vulnerable for the Cisco Catalyst 6500 Series and Cisco 7600
Series Routers.
* Cisco PIX Firewall
* Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500
Series and Cisco 7600 Series routers
* Cisco MDS 9000 Series Multilayer Switch
* Cisco Content Service Switch (CSS) 11000 series
* Cisco Global Site Selector (GSS) 4480
* CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common
Management Foundation (CMF) version 2.1
* Cisco Access Registrar (CAR)
The following products have their SSL implementation based on the OpenSSL code and are not affected by this vulnerability.
* Cisco Secure Intrusion Detection System (NetRanger) appliance. This
includes the IDS-42xx appliances, NM-CIDS and WS-SVS-IDSM2.
* Cisco SN 5428 and SN 5428-2 Storage Router
* Cisco CNS Configuration Engine
* Cisco Network Analysis Modules (NAM) for the Cisco Catalyst 6000 and
6500 Series switches and Cisco 7600 Series routers
* Cisco SIP Proxy Server (SPS)
* CiscoWorks 1105 Hosting Solution Engine (HSE)
* CiscoWorks 1105 Wireless LAN Solution Engine (WLSE)
* Cisco Ethernet Subscriber Solution Engine (ESSE)
The following products, which implement SSL, are not affected by this vulnerability.
* Cisco VPN 3000 Series Concentrators
CatOS does not implement SSL and is not vulnerable.
No other Cisco products are currently known to be affected by this vulnerability. This vulnerability is still being actively investigated across Cisco products and status of some products has still not been determined.
Details
Secure Sockets Layer (SSL), is a protocol used to encrypt the data transferred over an TCP session. SSL in Cisco products is mainly used by the HyperText Transfer Protocol Secure (HTTPS) web service for which the default TCP port is 443. The affected products, listed above, are only vulnerable if they have the HTTPS service enabled and the access to the service is not limited to trusted hosts or network management workstations.
To check if the HTTPS service is enabled one can do the following:
1. Check the configuration on the device to verify the status of the
HTTPS service.
2. Try to connect to the device using a standard web browser that
supports SSL using a URL similar to https://ip_address_of_device/.
3. Try and connect to the default HTTPS port, TCP 443, using Telnet.
telnet ip_address_of_device 443. If the session connects the service
is enabled and accessible. This
crash on many Cisco products would cause the device to reload.
A third vulnerability described in the NISCC advisory is a bug in older versions of OpenSSL, versions before 0.9.6d, that can also lead to a Denial of Service attack. None of the Cisco OpenSSL implementations are known to be affected by this older OpenSSL issue.
* Cisco IOS - All 12.1(11)E and later IOS software crypto (56i and k2)
image releases in the 12.1E release train for the Cisco 7100 and 7200
Series Routers are affected by this vulnerability. All IOS software
crypto (k8, k9, and k91) image releases in the 12.2SY release train
for the Cisco Catalyst 6500 Series and Cisco 7600 Series Routers are
affected by this vulnerability. The SSH implementation in IOS is not
dependent on any OpenSSL code. SSH implementations in IOS do not
handle certificates, yet, and therefore do not use any SSL code for
SSH. OpenSSL in 12.1E and 12.2SY release trains is only used for
providing the HTTPS and VPN Device Manager (VDM) services. This
vulnerability is documented in the Cisco Bug Toolkit (registered
customers only) as Bug ID CSCee00041. The HTTPS web service, that uses
the OpenSSL code, on the device is disabled by default. The no ip http
secure-server command may be used to disable the HTTPS web service on
the device, if required. The SSH and IPSec services in IOS are not
vulnerable to this vulnerability.
* Cisco PIX Firewall - PIX 6.x releases are affected by this
vulnerability. PIX 5.x releases do not contain any SSL code and are
not vulnerable. This vulnerability is documented in the Cisco Bug
Toolkit (registered customers only) as Bug ID CSCed90672.
* Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500
Series and Cisco 7600 Series routers - This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCee02055.
* Cisco MDS 9000 Series Multilayer Switches - This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCed96246.
* Cisco Content Service Switch (CSS) 11000 series - WebNS version 6.x
and 7.x are affected by this vulnerability. This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCee01234 for SCM and is documented in the Cisco Bug Toolkit
(registered customers only) as Bug ID CSCee01240 for the SSL module.
* Cisco Global Site Selector (GSS) 4480 - This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCee01057.
* CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common
Management Foundation (CMF) version 2.1 - This vulnerability is
documented in the Cisco Bug Toolkit (registered customers only) as Bug
ID CSCsa13748.
* Cisco Access Registrar (CAR) - This vulnerability is documented in the
Cisco Bug Toolkit (registered customers only) as Bug ID CSCee01956.
The Internetworking Terms and Cisco Systems Acronyms online guides can be found at http://www.cisco.com/univercd/cc/td/doc/cisintwk/.
Impact
An affected network device running an SSL server based on the OpenSSL implementation may be vulnerable to a Denial of Service (DoS) attack.
Software Versions and Fixes
* Cisco IOS -
+----------------------------------------+
|Release| Fixed Releases |Availability |
| Train | | |
|-------+------------------+-------------|
|12.2SY |12.2(14)SY4 |March 25 |
|-------+------------------+-------------|
| |12.1(13)E14 |April 8 |
|12.1E |12.1.(19)E7 |April 8 |
| |12.1(20)E3 |April 26 |
+----------------------------------------+
* Cisco PIX Firewall - The vulnerability is fixed in software releases
6.0(4)102, 6.1(5)102, 6.2(3)107, and 6.3(3)124. These engineering
builds may be obtained by contacting the Cisco Technical Assistance
Center (TAC). TAC Contact information is given in the Obtaining Fixed
Software section below.
* Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500
Series and Cisco 7600 Series routers - The vulnerability is fixed in
software release 1.1.3(14) which will be available by Monday, 22 of
March, 2004. This engineering builds may be obtained by contacting the
Cisco Technical Assistance Center (TAC). TAC Contact information is
given in the Obtaining Fixed Software section below.
* Cisco MDS 9000 Series Multilayer Switches - No fixed software release
or software availability date has been determined yet.
* Cisco Content Service Switch (CSS) 11000 series -No fixed software
release or software availability date has been determined yet.
* Cisco Global Site Selector (GSS) 4480 - No fixed software release or
software availability date has been determined yet.
* CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common
Management Foundation (CMF) version 2.1 - No fixed software release or
software availability date has been determined yet.
* Cisco Access Registrar (CAR) - The vulnerability is fixed in software
release 3.5.0.12 which will be available by Friday, 26 of March, 2004.
Obtaining Fixed Software
Cisco is offering free software upgrades to address this vulnerability for all affected customers.
Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, Customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/public/sw-license-agreement.html, or as otherwise set forth at the Cisco Connection Online Software Center at http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/tacpage/sw-center. To access the software download URL, you must be a registered user and you must be logged in.
Customers whose Cisco products are provided or maintained through a prior or existing agreement with third-party support organizations such as Cisco Partners, authorized resellers, or service providers, should contact that support organization for assistance with obtaining the software upgrade(s).
Customers who purchase direct from Cisco but who do not hold a Cisco service contract and customers who purchase through third-party vendors but are unsuccessful at obtaining fixed software through their point of sale should get their upgrades by contacting the Cisco Technical Assistance Center (TAC) using the contact information listed below. In these cases, customers are entitled to obtain a free upgrade to a later version of the same release or as indicated by the applicable corrected software version in the Software Versions and Fixes section (noted above).
Cisco TAC contacts are as follows:
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
See http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including special localized telephone numbers and instructions and e-mail addresses for use in various languages.
Please have your product serial number available and give the URL of this notice as evidence of your entitlement to a upgrade. Upgrades for non-contract customers must be requested through the TAC.
Please do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for software upgrades.
Workarounds
The Cisco PSIRT recommends that affected users upgrade to a fixed software version of code as soon as it is available.
* Restrict access to the HTTPS server on the network device. Allow
access to the network device only from trusted workstations by using
access lists / MAC filters that are available on the affected
platforms.
* Disable the SSL server / service on the network device. This
workaround must be weighed against the need for secure communications
with the vulnerable device.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any malicious use of the vulnerability described in this advisory.
This vulnerability was reported to Cisco PSIRT by NISCC.
Status of This Notice: INTERIM
This is an interim advisory. Although Cisco cannot guarantee the accuracy of all statements in this advisory, all of the facts have been checked to the best of our ability. Cisco does not anticipate issuing updated versions of this advisory unless there is some material change in the facts. Should there be a significant change in the facts, Cisco may update this advisory.
A stand-alone copy or paraphrase of the text of this security advisory that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory will be posted on Cisco's worldwide website at http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml .
In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key having the fingerprint 8C82 5207 0CA9 ED40 1DD2 EE2A 7B31 A8CF 32B6 B590 and is posted to the following e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-teams@first.org (includes CERT/CC)
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.netsys.com
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.
Revision History
+------------------------------------------+ |Revision 1.0|2004-March-17|Initial | | | |release. | +------------------------------------------+
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/warp/public/707/sec_incident_response.shtml. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.
This advisory is copyright 2004 by Cisco Systems, Inc. This advisory may be redistributed freely after the release date given at the top of the text, provided that redistributed copies are complete and unmodified, including all date and version information.
----------------------------------------------------------------------
-----BEGIN PGP SIGNATURE----- Comment: PGP Signed by Sharad Ahlawat, Cisco Systems PSIRT
iD8DBQFAWFvZezGozzK2tZARAqIwAKDXDMLAY6eDYyU8y1MhKZUto2SRxwCg+oid 7AhsNlLsNVSLwTRKTHSigu0= =gtba -----END PGP SIGNATURE----- . Any application that makes use of OpenSSL's SSL/TLS library may be affected. Any application that makes use of OpenSSL's SSL/TLS library may be affected.
Recommendations
Upgrade to OpenSSL 0.9.7d or 0.9.6m. Recompile any OpenSSL applications statically linked to OpenSSL libraries.
OpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html):
ftp://ftp.openssl.org/source/
The distribution file names are:
o openssl-0.9.7d.tar.gz
MD5 checksum: 1b49e90fc8a75c3a507c0a624529aca5
o openssl-0.9.6m.tar.gz [normal]
MD5 checksum: 1b63bfdca1c37837dddde9f1623498f9
o openssl-engine-0.9.6m.tar.gz [engine]
MD5 checksum: 4c39d2524bd466180f9077f8efddac8c
The checksums were calculated using the following command:
openssl md5 openssl-0.9*.tar.gz
Credits
Patches for these issues were created by Dr Stephen Henson (steve@openssl.org) of the OpenSSL core team. The OpenSSL team would like to thank Codenomicon for supplying the TLS Test Tool which was used to discover these vulnerabilities, and Joe Orton of Red Hat for performing the majority of the testing.
References
http://www.codenomicon.com/testtools/tls/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112
URL for this Security Advisory: http://www.openssl.org/news/secadv_20040317.txt
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "openbsd",
"scope": "eq",
"trust": 2.1,
"vendor": "openbsd",
"version": "3.4"
},
{
"_id": null,
"model": "okena stormwatch",
"scope": "eq",
"trust": 2.1,
"vendor": "cisco",
"version": "3.2"
},
{
"_id": null,
"model": "ciscoworks common services",
"scope": "eq",
"trust": 2.1,
"vendor": "cisco",
"version": "2.2"
},
{
"_id": null,
"model": "ciscoworks common management foundation",
"scope": "eq",
"trust": 2.1,
"vendor": "cisco",
"version": "2.1"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "1.1.3"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 1.9,
"vendor": "cisco",
"version": "1.1.2"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.1_\\(3.005\\)"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "2.1_\\(0.208\\)"
},
{
"_id": null,
"model": "gsx server",
"scope": "eq",
"trust": 1.3,
"vendor": "vmware",
"version": "2.5.1"
},
{
"_id": null,
"model": "gsx server",
"scope": "eq",
"trust": 1.3,
"vendor": "vmware",
"version": "2.0"
},
{
"_id": null,
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.9"
},
{
"_id": null,
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.8"
},
{
"_id": null,
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.7"
},
{
"_id": null,
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"_id": null,
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7.2"
},
{
"_id": null,
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.2.4"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.2.1"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.2"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.1"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.9"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.8"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.7"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.6"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.5"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.4"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.1"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7.2"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7.1"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.6.3"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.6.2"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.5.18"
},
{
"_id": null,
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.5.17"
},
{
"_id": null,
"model": "stonebeat webcluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.5"
},
{
"_id": null,
"model": "stonebeat webcluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"_id": null,
"model": "stonebeat securitycluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.5"
},
{
"_id": null,
"model": "stonebeat securitycluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"_id": null,
"model": "servercluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.5.2"
},
{
"_id": null,
"model": "servercluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.5"
},
{
"_id": null,
"model": "propack",
"scope": "eq",
"trust": 1.3,
"vendor": "sgi",
"version": "3.0"
},
{
"_id": null,
"model": "propack",
"scope": "eq",
"trust": 1.3,
"vendor": "sgi",
"version": "2.4"
},
{
"_id": null,
"model": "propack",
"scope": "eq",
"trust": 1.3,
"vendor": "sgi",
"version": "2.3"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "redhat",
"version": "8.0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "redhat",
"version": "7.3"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "redhat",
"version": "7.2"
},
{
"_id": null,
"model": "openbsd",
"scope": "eq",
"trust": 1.3,
"vendor": "openbsd",
"version": "3.3"
},
{
"_id": null,
"model": "imanager",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "2.0"
},
{
"_id": null,
"model": "imanager",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "1.5"
},
{
"_id": null,
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.7.1"
},
{
"_id": null,
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.7"
},
{
"_id": null,
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.6.2"
},
{
"_id": null,
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.5.27"
},
{
"_id": null,
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.5"
},
{
"_id": null,
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.0"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 1.3,
"vendor": "hp",
"version": "11.23"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 1.3,
"vendor": "hp",
"version": "11.11"
},
{
"_id": null,
"model": "apache-based web server",
"scope": "eq",
"trust": 1.3,
"vendor": "hp",
"version": "2.0.43.04"
},
{
"_id": null,
"model": "apache-based web server",
"scope": "eq",
"trust": 1.3,
"vendor": "hp",
"version": "2.0.43.00"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 1.3,
"vendor": "freebsd",
"version": "5.2"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 1.3,
"vendor": "freebsd",
"version": "5.1"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 1.3,
"vendor": "freebsd",
"version": "4.9"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 1.3,
"vendor": "freebsd",
"version": "4.8"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "7.10"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "6.10"
},
{
"_id": null,
"model": "secure content accelerator",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "10000"
},
{
"_id": null,
"model": "css secure content accelerator",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "2.0"
},
{
"_id": null,
"model": "css secure content accelerator",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "1.0"
},
{
"_id": null,
"model": "sg5",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.4"
},
{
"_id": null,
"model": "sg5",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.3"
},
{
"_id": null,
"model": "sg5",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.2"
},
{
"_id": null,
"model": "sg208",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.4"
},
{
"_id": null,
"model": "sg203",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.31.29"
},
{
"_id": null,
"model": "sg203",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.4"
},
{
"_id": null,
"model": "sg200",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.31.29"
},
{
"_id": null,
"model": "sg200",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.4"
},
{
"_id": null,
"model": "converged communications server",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "2.0"
},
{
"_id": null,
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.3.1"
},
{
"_id": null,
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.3"
},
{
"_id": null,
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2.4"
},
{
"_id": null,
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2.3"
},
{
"_id": null,
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2.2"
},
{
"_id": null,
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2.1"
},
{
"_id": null,
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2"
},
{
"_id": null,
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "4.0"
},
{
"_id": null,
"model": "threat response",
"scope": null,
"trust": 1.1,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 1.1,
"vendor": "cisco",
"version": "6.3"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 1.1,
"vendor": "cisco",
"version": "6.2"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 1.1,
"vendor": "cisco",
"version": "6.1"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 1.1,
"vendor": "cisco",
"version": "6.0"
},
{
"_id": null,
"model": "call manager",
"scope": null,
"trust": 1.1,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "access registrar",
"scope": null,
"trust": 1.1,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3.1"
},
{
"_id": null,
"model": "access registrar",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "openserver",
"scope": "eq",
"trust": 1.0,
"vendor": "sco",
"version": "5.0.6"
},
{
"_id": null,
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.0.03"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(3.100\\)"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(1\\)"
},
{
"_id": null,
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp0"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sy"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3\\(1\\)"
},
{
"_id": null,
"model": "provider-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "4.1"
},
{
"_id": null,
"model": "s8500",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.0"
},
{
"_id": null,
"model": "freebsd",
"scope": "eq",
"trust": 1.0,
"vendor": "freebsd",
"version": "5.2.1"
},
{
"_id": null,
"model": "sg208",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "*"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3_rc1"
},
{
"_id": null,
"model": "css11000 content services switch",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "2.5"
},
{
"_id": null,
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "2.0"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3_rc3"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(1\\)"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(3\\)"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.1"
},
{
"_id": null,
"model": "gss 4490 global site selector",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "edirectory",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "8.5.12a"
},
{
"_id": null,
"model": "enterprise",
"scope": "eq",
"trust": 1.0,
"vendor": "tarantella",
"version": "3.30"
},
{
"_id": null,
"model": "content services switch 11500",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.3"
},
{
"_id": null,
"model": "call manager",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2"
},
{
"_id": null,
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.0.02"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(4\\)"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3_rc2"
},
{
"_id": null,
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.0.04"
},
{
"_id": null,
"model": "intuity audix",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "*"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3\\(3.109\\)"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.1_0.2.06"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "10.3.3"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6f"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.10_.0.06s"
},
{
"_id": null,
"model": "gsx server",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "2.5.1_build_5336"
},
{
"_id": null,
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.0.01"
},
{
"_id": null,
"model": "vpn-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp0"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "0.9.6b-3"
},
{
"_id": null,
"model": "gss 4480 global site selector",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11b\\)e12"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.2_rc2"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(4.101\\)"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6h"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6d"
},
{
"_id": null,
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.1"
},
{
"_id": null,
"model": "threat response",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(5\\)"
},
{
"_id": null,
"model": "wbem",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "a.02.00.00"
},
{
"_id": null,
"model": "wbem",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "a.02.00.01"
},
{
"_id": null,
"model": "proxysg",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "*"
},
{
"_id": null,
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp1"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.2.1"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6i"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(3\\)"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3"
},
{
"_id": null,
"model": "intuity audix",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "s3400"
},
{
"_id": null,
"model": "vpn-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp2"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.2"
},
{
"_id": null,
"model": "intuity audix",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "s3210"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.0.3"
},
{
"_id": null,
"model": "cacheos ca sa",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "4.1.12"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2za"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2.2_.111"
},
{
"_id": null,
"model": "s8700",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.0"
},
{
"_id": null,
"model": "aaa server",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "*"
},
{
"_id": null,
"model": "enterprise",
"scope": "eq",
"trust": 1.0,
"vendor": "tarantella",
"version": "3.40"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sy1"
},
{
"_id": null,
"model": "mac os x server",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "10.3.3"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.1.1"
},
{
"_id": null,
"model": "crypto accelerator 4000",
"scope": "eq",
"trust": 1.0,
"vendor": "sun",
"version": "1.0"
},
{
"_id": null,
"model": "s8500",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.1"
},
{
"_id": null,
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "*"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6e"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11b\\)e14"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "100_r2.0.1"
},
{
"_id": null,
"model": "mds 9000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.0"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "3.0"
},
{
"_id": null,
"model": "clientless vpn gateway 4400",
"scope": "eq",
"trust": 1.0,
"vendor": "symantec",
"version": "5.0"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "5"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(1\\)"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(2\\)"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(13\\)e9"
},
{
"_id": null,
"model": "intuity audix",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "5.1.46"
},
{
"_id": null,
"model": "vpn-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "vsx_ng_with_application_intelligence"
},
{
"_id": null,
"model": "vpn-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp1"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6k"
},
{
"_id": null,
"model": "gsx server",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "3.0_build_7592"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(4\\)"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "11.00"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "5000_r2.0.1"
},
{
"_id": null,
"model": "enterprise",
"scope": "eq",
"trust": 1.0,
"vendor": "tarantella",
"version": "3.20"
},
{
"_id": null,
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "3.0"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6g"
},
{
"_id": null,
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "2.0"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "8.05"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.3.1"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11b\\)e"
},
{
"_id": null,
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.1.02"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "7500_r2.0.1"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.7b"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "0.9.6-15"
},
{
"_id": null,
"model": "s8300",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.0"
},
{
"_id": null,
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "2000_r2.0.1"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.2_rc1"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3\\(3.102\\)"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.10_b4"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "500"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.0"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6j"
},
{
"_id": null,
"model": "cacheos ca sa",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "4.1.10"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.1_0.1.02"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.0.1"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.0.2"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "5x"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "3.0"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.2.2"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "0.9.7a-2"
},
{
"_id": null,
"model": "application and content networking software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3\\(2\\)"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6c"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.2_0.0.03"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "10000_r2.0.1"
},
{
"_id": null,
"model": "wbem",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "a.01.05.08"
},
{
"_id": null,
"model": "s8700",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.1"
},
{
"_id": null,
"model": "openserver",
"scope": "eq",
"trust": 1.0,
"vendor": "sco",
"version": "5.0.7"
},
{
"_id": null,
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "1_2.0"
},
{
"_id": null,
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp2"
},
{
"_id": null,
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.1"
},
{
"_id": null,
"model": "gsx server",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "2.0.1_build_2129"
},
{
"_id": null,
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "1_3.0"
},
{
"_id": null,
"model": "s8300",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.1"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(3\\)"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(19\\)e1"
},
{
"_id": null,
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.0.1"
},
{
"_id": null,
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1"
},
{
"_id": null,
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.1"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.7c"
},
{
"_id": null,
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.7a"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2sy"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11\\)e"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple computer",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "check point",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "debian",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "openssl",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "suse",
"version": null
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0"
},
{
"_id": null,
"model": "cobalt raq4",
"scope": null,
"trust": 0.8,
"vendor": "sun microsystems",
"version": null
},
{
"_id": null,
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "1000 v1.0"
},
{
"_id": null,
"model": "turbolinux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10"
},
{
"_id": null,
"model": "provider-1",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "ng and later versions"
},
{
"_id": null,
"model": "vine linux",
"scope": "eq",
"trust": 0.8,
"vendor": "vine linux",
"version": "2.5"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.8,
"vendor": "netbsd",
"version": "2.0"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.8,
"vendor": "netbsd",
"version": "1.5.2"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "12.2"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.8,
"vendor": "netbsd",
"version": "1.6"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.1"
},
{
"_id": null,
"model": "vine linux",
"scope": "eq",
"trust": 0.8,
"vendor": "vine linux",
"version": "2.6"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.00"
},
{
"_id": null,
"model": "hp wbem services",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "for hp-ux a.02.00.00"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "12.1"
},
{
"_id": null,
"model": "hp-ux aaa server",
"scope": "lte",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "a.06.01.02.04 and earlier"
},
{
"_id": null,
"model": "turbolinux workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "6.0"
},
{
"_id": null,
"model": "vpn-1/firewall-1",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "ng and later versions"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (es)"
},
{
"_id": null,
"model": "hp wbem services",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "for linux a.02.00.01"
},
{
"_id": null,
"model": "primergy sslaccelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "7110"
},
{
"_id": null,
"model": "primergy sslaccelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "7115"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "cisco 7600 for )"
},
{
"_id": null,
"model": "netshelter series",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "check the information provided by the vendor. )"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.8,
"vendor": "netbsd",
"version": "1.5.1"
},
{
"_id": null,
"model": "trendmicro interscan viruswall",
"scope": "eq",
"trust": 0.8,
"vendor": "trend micro",
"version": "3.81"
},
{
"_id": null,
"model": "global site selector",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "4480 4490"
},
{
"_id": null,
"model": "hp-ux apache-based web server",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "version"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "6.5"
},
{
"_id": null,
"model": "css secure content accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "version 1 2"
},
{
"_id": null,
"model": "netscreen ive",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "all versions"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "6.1"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.8,
"vendor": "netbsd",
"version": "1.6.1"
},
{
"_id": null,
"model": "ipcom series",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "check the information provided by the vendor. )"
},
{
"_id": null,
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "500"
},
{
"_id": null,
"model": "ipcom series",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "( for details"
},
{
"_id": null,
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "1000 v1.1"
},
{
"_id": null,
"model": "netwatcher",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "( sensor device )"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (as)"
},
{
"_id": null,
"model": "css 11000 series",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "firewall-1 gx",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "v2.0"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "(cisco catalyst 6500 for"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "9"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.11"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (ws)"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "1.0 (workgroup)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "1.0 (hosting)"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "8"
},
{
"_id": null,
"model": "hp-ux apache-based web server",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "2.0.49.00"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.22"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "7"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.23"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.8,
"vendor": "netbsd",
"version": "1.6.2"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (ws)"
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.8,
"vendor": "netbsd",
"version": "1.5"
},
{
"_id": null,
"model": "hp-ux aaa server",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "a.06.01.02.06"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"_id": null,
"model": "vpn-1/firewall-1",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "vsx ng with application intelligence"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.0"
},
{
"_id": null,
"model": "mds 9000 series",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "multilayer switch"
},
{
"_id": null,
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "4000 v1.0"
},
{
"_id": null,
"model": "netscreen idp",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "2.0 - 2.1r6"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (as)"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.04"
},
{
"_id": null,
"model": "openssl",
"scope": "lte",
"trust": 0.8,
"vendor": "openssl",
"version": "0.9.7c and earlier"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (es)"
},
{
"_id": null,
"model": "application and content networking system",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (ws)"
},
{
"_id": null,
"model": "turbolinux workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "8"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (es)"
},
{
"_id": null,
"model": "primergy sslaccelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "7117"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (as)"
},
{
"_id": null,
"model": "hp wbem services",
"scope": "lte",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "for hp-ux a.01.05.08 and earlier"
},
{
"_id": null,
"model": "turbolinux workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "7"
},
{
"_id": null,
"model": "css 11500 series",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "netbsd",
"scope": "eq",
"trust": 0.8,
"vendor": "netbsd",
"version": "1.5.3"
},
{
"_id": null,
"model": "netshelter series",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "( for details"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "none",
"version": null
},
{
"_id": null,
"model": "ios 12.1 e",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "x10.4.2"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "x10.3.9"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "x10.4.2"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "x10.3.9"
},
{
"_id": null,
"model": "firewall services module",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "gsx server build",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.07592"
},
{
"_id": null,
"model": "gsx server build",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.15336"
},
{
"_id": null,
"model": "gsx server build",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.0.12129"
},
{
"_id": null,
"model": "enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "tarantella",
"version": "33.40"
},
{
"_id": null,
"model": "enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "tarantella",
"version": "33.30"
},
{
"_id": null,
"model": "enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "tarantella",
"version": "33.200"
},
{
"_id": null,
"model": "clientless vpn gateway series",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "44005.0"
},
{
"_id": null,
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "40001.0"
},
{
"_id": null,
"model": "stonebeat fullcluster for raptor",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.5"
},
{
"_id": null,
"model": "stonebeat fullcluster for raptor",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"_id": null,
"model": "stonebeat fullcluster for isa server",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "3.0"
},
{
"_id": null,
"model": "stonebeat fullcluster for gauntlet",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"_id": null,
"model": "stonebeat fullcluster for firewall-1",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "3.0"
},
{
"_id": null,
"model": "stonebeat fullcluster for firewall-1",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"_id": null,
"model": "propack sp6",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "3.0"
},
{
"_id": null,
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.24"
},
{
"_id": null,
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.23"
},
{
"_id": null,
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.22"
},
{
"_id": null,
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.21"
},
{
"_id": null,
"model": "irix f",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.21"
},
{
"_id": null,
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.20"
},
{
"_id": null,
"model": "irix f",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.20"
},
{
"_id": null,
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1.02"
},
{
"_id": null,
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1"
},
{
"_id": null,
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.04"
},
{
"_id": null,
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.03"
},
{
"_id": null,
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.02"
},
{
"_id": null,
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.01"
},
{
"_id": null,
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2"
},
{
"_id": null,
"model": "unixware",
"scope": "eq",
"trust": 0.3,
"vendor": "sco",
"version": "7.1.3"
},
{
"_id": null,
"model": "unixware",
"scope": "eq",
"trust": 0.3,
"vendor": "sco",
"version": "7.1.1"
},
{
"_id": null,
"model": "open server",
"scope": "eq",
"trust": 0.3,
"vendor": "sco",
"version": "5.0.7"
},
{
"_id": null,
"model": "open server",
"scope": "eq",
"trust": 0.3,
"vendor": "sco",
"version": "5.0.6"
},
{
"_id": null,
"model": "security bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.1"
},
{
"_id": null,
"model": "security bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.0.1"
},
{
"_id": null,
"model": "security bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.0"
},
{
"_id": null,
"model": "openssl096b-0.9.6b-3.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"_id": null,
"model": "openssl096-0.9.6-15.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"_id": null,
"model": "openssl-perl-0.9.7a-2.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"_id": null,
"model": "openssl-devel-0.9.7a-2.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"_id": null,
"model": "openssl-0.9.7a-2.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"_id": null,
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7.3"
},
{
"_id": null,
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"_id": null,
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"_id": null,
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4.0"
},
{
"_id": null,
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3.0"
},
{
"_id": null,
"model": "hat fedora core3",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"_id": null,
"model": "hat fedora core2",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"_id": null,
"model": "hat fedora core1",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"_id": null,
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "4"
},
{
"_id": null,
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "3"
},
{
"_id": null,
"model": "project openssl c",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "project openssl beta3",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "project openssl beta2",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "project openssl beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "project openssl b",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "project openssl a",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "project openssl k",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "project openssl j",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "project openssl i",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "project openssl h",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "project openssl g",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "project openssl f",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "project openssl e",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "project openssl d",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "project openssl c",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "edirectory su1",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "8.7.1"
},
{
"_id": null,
"model": "edirectory a",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "8.5.12"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.3.1"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.3"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.2"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.1"
},
{
"_id": null,
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.0"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3.1"
},
{
"_id": null,
"model": "litespeed web server rc3",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3"
},
{
"_id": null,
"model": "litespeed web server rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3"
},
{
"_id": null,
"model": "litespeed web server rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.2.2"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.2.1"
},
{
"_id": null,
"model": "litespeed web server rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.2"
},
{
"_id": null,
"model": "litespeed web server rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.2"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.1.1"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.1"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.0.3"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.0.2"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.0.1"
},
{
"_id": null,
"model": "wbem a.02.00.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "wbem a.02.00.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "wbem a.01.05.08",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "11.0"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "8.5"
},
{
"_id": null,
"model": "aaa server",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "-release",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "5.2"
},
{
"_id": null,
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "5.1"
},
{
"_id": null,
"model": "-release",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "5.1"
},
{
"_id": null,
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "4.8"
},
{
"_id": null,
"model": "associates etrust security command center",
"scope": "eq",
"trust": 0.3,
"vendor": "computer",
"version": "1.0"
},
{
"_id": null,
"model": "secure gateway for solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "1.13"
},
{
"_id": null,
"model": "secure gateway for solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "1.12"
},
{
"_id": null,
"model": "secure gateway for solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "1.1"
},
{
"_id": null,
"model": "webns .0.06s",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.10"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.20.0.03"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.10.2.06"
},
{
"_id": null,
"model": "webns",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.10.1.02"
},
{
"_id": null,
"model": "webns b4",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.10"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3.2"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3.1"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3(3.109)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3(3.102)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3(1)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2.3"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2.2.111"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2.2"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2.1"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2(3.100)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2(3)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2(2)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2(1)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.5"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.4"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.3"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(5)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(4)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(3)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(2)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(1)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0.4"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0.3"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0(4.101)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0(4)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0(2)"
},
{
"_id": null,
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0(1)"
},
{
"_id": null,
"model": "mds",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9000"
},
{
"_id": null,
"model": "ios 12.2za",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.2sy",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.2 sy1",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.2 sy",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.1 e1",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.1 e9",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.1 e14",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.1 e12",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.1 ec",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ios 12.1 ea1",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "gss global site selector",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "44900"
},
{
"_id": null,
"model": "gss global site selector",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4480"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2.1(0.208)"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "1.1(3.005)"
},
{
"_id": null,
"model": "firewall services module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "css11500 content services switch",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "css11000 content services switch",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "point software vpn-1 vsx ng with application intelligence",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"_id": null,
"model": "point software vpn-1 next generation fp2",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"_id": null,
"model": "point software vpn-1 next generation fp1",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"_id": null,
"model": "point software vpn-1 next generation fp0",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"_id": null,
"model": "point software providor-1 sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software providor-1 sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software providor-1 sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software providor-1 sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software providor-1",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1 vsx ng with application intelligence",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"_id": null,
"model": "point software firewall-1 next generation fp2",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"_id": null,
"model": "point software firewall-1 next generation fp1",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"_id": null,
"model": "point software firewall-1 next generation fp0",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"_id": null,
"model": "point software firewall-1 gx",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "2.0"
},
{
"_id": null,
"model": "coat systems proxysg",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "0"
},
{
"_id": null,
"model": "coat systems cacheos ca/sa",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "4.1.12"
},
{
"_id": null,
"model": "coat systems cacheos ca/sa",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "4.1.10"
},
{
"_id": null,
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7500"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5x0"
},
{
"_id": null,
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5000"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5000"
},
{
"_id": null,
"model": "vsu",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "50"
},
{
"_id": null,
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2000"
},
{
"_id": null,
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "10000"
},
{
"_id": null,
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "100"
},
{
"_id": null,
"model": "sg5x",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.4"
},
{
"_id": null,
"model": "sg5x",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.3"
},
{
"_id": null,
"model": "sg5x",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2"
},
{
"_id": null,
"model": "sg208",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "0"
},
{
"_id": null,
"model": "s8700 r2.0.1",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "s8700 r2.0.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "s8500 r2.0.1",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "s8500 r2.0.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "s8300 r2.0.1",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "s8300 r2.0.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "intuity r5 r5.1.46",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "intuity audix r5",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "0"
},
{
"_id": null,
"model": "intuity s3400",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "intuity s3210",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "intuity lx",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"_id": null,
"model": "gsx server",
"scope": "ne",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.2"
},
{
"_id": null,
"model": "stonegate sparc",
"scope": "ne",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.2.12"
},
{
"_id": null,
"model": "stonegate",
"scope": "ne",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.2.5x86"
},
{
"_id": null,
"model": "stonegate ibm zseries",
"scope": "ne",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.2.5"
},
{
"_id": null,
"model": "computing sidewinder",
"scope": "ne",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1.10"
},
{
"_id": null,
"model": "security bsafe ssl-j sdk",
"scope": "ne",
"trust": 0.3,
"vendor": "rsa",
"version": "4.1"
},
{
"_id": null,
"model": "project openssl d",
"scope": "ne",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"_id": null,
"model": "project openssl m",
"scope": "ne",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "ne",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3.2"
},
{
"_id": null,
"model": "litespeed web server",
"scope": "ne",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.0.2"
},
{
"_id": null,
"model": "secure gateway for solaris",
"scope": "ne",
"trust": 0.3,
"vendor": "citrix",
"version": "1.14"
},
{
"_id": null,
"model": "threat response",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "2.0.3"
},
{
"_id": null,
"model": "mds",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "90002.0(0.86)"
},
{
"_id": null,
"model": "mds",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "90001.3(3.33)"
},
{
"_id": null,
"model": "point software vpn-1 sp6",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software vpn-1 sp5a",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software vpn-1 sp5",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software vpn-1 sp4",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software vpn-1 sp3",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software vpn-1 sp2",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software vpn-1 sp1",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software vpn-1",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1 sp6",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1 sp5a",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1 sp5",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1 sp4",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1 sp3",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1 sp2",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1 sp1",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "point software firewall-1",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"_id": null,
"model": "webstar",
"scope": "ne",
"trust": 0.3,
"vendor": "4d",
"version": "5.3.2"
},
{
"_id": null,
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "9.0"
},
{
"_id": null,
"model": "fedora core2",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"_id": null,
"model": "fedora core1",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"_id": null,
"model": "oneworld xe/erp8 applications sp22",
"scope": null,
"trust": 0.3,
"vendor": "peoplesoft",
"version": null
},
{
"_id": null,
"model": "enterpriseone applications",
"scope": "eq",
"trust": 0.3,
"vendor": "peoplesoft",
"version": "8.93"
},
{
"_id": null,
"model": "enterpriseone applications sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "peoplesoft",
"version": "8.9"
},
{
"_id": null,
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.6"
},
{
"_id": null,
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.0.5"
},
{
"_id": null,
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4"
},
{
"_id": null,
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.5"
},
{
"_id": null,
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.4"
},
{
"_id": null,
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.6"
},
{
"_id": null,
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.0.5"
},
{
"_id": null,
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4"
},
{
"_id": null,
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.5"
},
{
"_id": null,
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.4"
},
{
"_id": null,
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.6.0"
},
{
"_id": null,
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.0.5"
},
{
"_id": null,
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4"
},
{
"_id": null,
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.5"
},
{
"_id": null,
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.4"
},
{
"_id": null,
"model": "oracle9i application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.3.1"
},
{
"_id": null,
"model": "oracle9i application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.2.3"
},
{
"_id": null,
"model": "oracle9i application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "1.0.2.2"
},
{
"_id": null,
"model": "oracle8i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.1.7.4"
},
{
"_id": null,
"model": "oracle8i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.1.7.4.0"
},
{
"_id": null,
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.4"
},
{
"_id": null,
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3.1"
},
{
"_id": null,
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3"
},
{
"_id": null,
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.2"
},
{
"_id": null,
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.4"
},
{
"_id": null,
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3.1"
},
{
"_id": null,
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3"
},
{
"_id": null,
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.2"
},
{
"_id": null,
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.4"
},
{
"_id": null,
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3.1"
},
{
"_id": null,
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3"
},
{
"_id": null,
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.2"
},
{
"_id": null,
"model": "oracle10g application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.2"
},
{
"_id": null,
"model": "oracle10g application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3.1"
},
{
"_id": null,
"model": "oracle10g application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4.1"
},
{
"_id": null,
"model": "oracle10g application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4.0"
},
{
"_id": null,
"model": "enterprise manager grid control 10g",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.3"
},
{
"_id": null,
"model": "enterprise manager grid control 10g",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.2"
},
{
"_id": null,
"model": "enterprise manager",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4.1"
},
{
"_id": null,
"model": "enterprise manager",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4.0"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.10"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.9"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.8"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.7"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.6"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.5"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.4"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.3"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.2"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.1"
},
{
"_id": null,
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5"
},
{
"_id": null,
"model": "e-business suite",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.0"
},
{
"_id": null,
"model": "collaboration suite release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "29.0.4.2"
},
{
"_id": null,
"model": "collaboration suite release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "29.0.4.1"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#288574"
},
{
"db": "CNVD",
"id": "CNVD-2004-0791"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "14567"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-124"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000086"
},
{
"db": "NVD",
"id": "CVE-2004-0079"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:netbsd:netbsd",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:openbsd:openbsd",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:openssl:openssl",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:vine_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:sun:sun_crypto_accelerator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cisco:access_registrar",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cisco:application_and_content_networking_system_software",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:call_manager",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:css_11000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:css_11500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cisco:secure_content_accelerator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:firewall_services_module",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:gss_global_site_selector",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:ios",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:mds_9000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cisco:okena_stormwatch",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:cisco:pix_firewall",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cisco:threat_response",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cisco:ciscoworks_common_management_foundation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cisco:ciscoworks_common_services",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:juniper:netscreen-idp",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:juniper:netscreen-ive",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_appliance_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:checkpoint:firewall-1_gx",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:checkpoint:provider-1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:checkpoint:vpn-1_firewall-1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:trendmicro:interscan_viruswall",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:hp:wbem",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:hp:hp-ux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hp:aaa_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hp:apache-based_web_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:ipcom",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:netshelter",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:netwatcher",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:primergy_ssl_accelerator",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000086"
}
]
},
"credits": {
"_id": null,
"data": "OpenSSL Security Advisory",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200411-124"
}
],
"trust": 0.6
},
"cve": "CVE-2004-0079",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2004-0079",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-8509",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2004-0079",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2004-0079",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2004-0079",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#288574",
"trust": 0.8,
"value": "27.38"
},
{
"author": "NVD",
"id": "CVE-2004-0079",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-200411-124",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-8509",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#288574"
},
{
"db": "VULHUB",
"id": "VHN-8509"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-124"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000086"
},
{
"db": "NVD",
"id": "CVE-2004-0079"
},
{
"db": "NVD",
"id": "CVE-2004-0079"
}
]
},
"description": {
"_id": null,
"data": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference. OpenSSL Is SSL/TLS Due to incomplete implementation of do_change_cipher_spec() In the function NULL A vulnerability exists where pointers are not handled properly.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. OpenSSL is an open source SSL implementation used to implement high-strength encryption of network communications. It is now widely used in various network applications. \n\n\u00a0Using the Codenomicon TLS test tool, OpenSSL found a NULL pointer allocation in the do_change_cipher_spec () function. Applications that rely on this library will generate a denial of service. \nFor the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. \nThe second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. \nThis entry will be retired when individual BID records are created for each issue. \n*Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Multiple security vulnerabilities are reported to affect Apple Mac OS X; updates are available. \nApache is prone to five vulnerabilities ranging from buffer overflows to access validation vulnerabilities. The CVE Mitre candidate IDs CAN-2005-1344, CAN-2004-0942, CAN-2004-0885, CAN-2004-1083, and CAN-2004-1084 are assigned to these issues. \nAppkit is prone to three vulnerabilities. Two of these could result in arbitrary code execution, the third could permit the creation of local accounts. The CVE Mitre candidate IDs CAN-2005-2501, CAN-2005-2502, and CAN-2005-2503 are assigned to these issues. \nBluetooth is prone to a vulnerability regarding authentication bypass. The CVE Mitre candidate ID CAN-2005-2504 is assigned to this issue. \nCoreFoundation is prone to two vulnerabilities, one resulting in a buffer overflow, the other a denial-of-service vulnerability. The CVE Mitre candidate IDs CAN-2005-2505 and CAN-2005-2506 are assigned to these issues. \nCUPS is prone to two vulnerabilities resulting in a denial of service until the service can be restarted. The CVE Mitre candidate IDs CAN-2005-2525 and CAN-2005-2526 are assigned to these issues. \nDirectory Services is prone to three vulnerabilities. These issues vary from buffer overflow, unauthorized account creation and deletion, and privilege escalation. The CVE Mitre candidate IDs CAN-2005-2507, CAN-2005-2508 and CAN-2005-2519 are assigned to these issues. \nHItoolbox is prone to a vulnerability that could result in information disclosure. The CVE Mitre candidate ID CAN-2005-2513 is assigned to this issue. \nKerberos is prone to five vulnerabilities that may result in a buffer overflow, execution of arbitrary code, and root compromise. The CVE Mitre candidate IDs CAN-2004-1189, CAN-2005-1174, CAN-2005-1175, CAN-2005-1689, and CAN-2005-2511 are assigned to these issues. \nloginwindow is prone to a vulnerability that could permit a user to gain access to other logged-in accounts. The CVE Mitre candidate ID CAN-2005-2509 is assigned to this issue. \nMail is prone to a vulnerability regarding the loss of privacy when remote images are loaded into HTML email. The CVE Mitre candidate ID CAN-2005-2512 is assigned to this issue. \nMySQL is prone to three vulnerabilities that include arbitrary code execution by remote authenticated users. The CVE Mitre candidate IDs CAN-2005-0709, CAN-2005-0710, and CAN-2005-0711 are assigned to these issues. The CVE Mitre candidate IDs CAN-2004-0079 and CAN-2004-0112 are assigned to these issues. \nping is prone to a vulnerability that could allow local privilege escalation and arbitrary code execution. The CVE Mitre candidate ID CAN-2005-2514 is assigned to this issue. \nQuartzComposerScreenSaver is prone to a vulnerability that could allow users to open pages while the RSS Visualizer screen is locked. The CVE Mitre candidate ID CAN-2005-2515 is assigned to this issue. \nSafari is prone to two vulnerabilities that could result in arbitrary command execution or have information submitted to an incorrect site. The CVE Mitre candidate IDs CAN-2005-2516 and CAN-2005-2517 are assigned to these issues. \nSecurityInterface is prone to a vulnerability that could expose recently used passwords. The CVE Mitre candidate ID CAN-2005-2520 is assigned to this issue. \nservermgrd is prone to a buffer-overflow vulnerability that could ultimately lead to the execution of arbitrary code. The CVE Mitre candidate ID CAN-2005-2518 is assigned to this issue. \nservermgr_ipfilter is prone to a vulnerability regarding firewall settings not always being written to the Active Rules. The CVE Mitre candidate ID CAN-2005-2510 is assigned to this issue. \nSquirrelMail is prone to two vulnerabilities including a cross-site scripting issue. The CVE Mitre candidate IDs CAN-2005-1769 and CAN-2005-2095 are assigned to these issues. \ntraceroute is prone to a vulnerability that could result in arbitrary code execution and privilege escalation. The CVE Mitre candidate ID CAN-2005-2521 is assigned to this issue. \nWebKit is affected by a vulnerability that could result in code execution regarding a malformed PDF file. The CVE Mitre candidate ID CAN-2005-2522 is assigned to this issue. \nWeblog Server is prone to multiple cross-site scripting vulnerabilities. The CVE Mitre candidate ID CAN-2005-2523 is assigned to this issue. \nX11 is prone to a vulnerability that could result in arbitrary code execution. The CVE Mitre candidate ID CAN-2005-0605 is assigned to this issue. \nzlib is prone to two denial-of-service vulnerabilities that may ultimately lead to arbitrary code execution. The CVE Mitre candidate IDs CAN-2005-2096 and CAN-2005-1849 are assigned to these issues. \nThese vulnerabilities will be separated into individual BIDs upon further analysis of the issues. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. \nOracle has released a Critical Patch Update to address these issues in various supported applications and platforms. \nThe issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. \nThis BID will be divided and updated into separate BIDs when more information is available. It supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, security hashing algorithm, etc. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n Cisco Security Advisory: Cisco OpenSSL Implementation Vulnerability\n\nRevision 1.0\n\n For Public Release 2004 March 17 at 1300 UTC (GMT)\n\n ----------------------------------------------------------------------\n\nContents\n\n Summary\n Affected Products\n Details\n Impact\n Software Versions and Fixes\n Obtaining Fixed Software\n Workarounds\n Exploitation and Public Announcements\n Status of This Notice: INTERIM\n Distribution\n Revision History\n Cisco Security Procedures\n\n ----------------------------------------------------------------------\n\nSummary\n\n A new vulnerability in the OpenSSL implementation for SSL\n has been announced on March 17, 2004. \n\n An affected network device running an SSL server based on an affected\n OpenSSL implementation may be vulnerable to a Denial of Service (DoS)\n attack. There are workarounds available to mitigate the effects of this\n vulnerability on Cisco products in the workaround section of this\n advisory. Cisco is providing fixed software, and recommends that customers\n upgrade to it when it is available. \n\n This advisory will be posted at\n http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml. \n\n * Cisco IOS 12.1(11)E and later in the 12.1E release train. Only crypto\n images (56i and k2) are vulnerable for the Cisco 7100 and 7200 Series\n Routers. \n * Cisco IOS 12.2SY release train. Only crypto images (k8, k9 and k91)\n are vulnerable for the Cisco Catalyst 6500 Series and Cisco 7600\n Series Routers. \n * Cisco PIX Firewall\n * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500\n Series and Cisco 7600 Series routers\n * Cisco MDS 9000 Series Multilayer Switch\n * Cisco Content Service Switch (CSS) 11000 series\n * Cisco Global Site Selector (GSS) 4480\n * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common\n Management Foundation (CMF) version 2.1\n * Cisco Access Registrar (CAR)\n\n The following products have their SSL implementation based on the OpenSSL\n code and are not affected by this vulnerability. \n\n * Cisco Secure Intrusion Detection System (NetRanger) appliance. This\n includes the IDS-42xx appliances, NM-CIDS and WS-SVS-IDSM2. \n * Cisco SN 5428 and SN 5428-2 Storage Router\n * Cisco CNS Configuration Engine\n * Cisco Network Analysis Modules (NAM) for the Cisco Catalyst 6000 and\n 6500 Series switches and Cisco 7600 Series routers\n * Cisco SIP Proxy Server (SPS)\n * CiscoWorks 1105 Hosting Solution Engine (HSE)\n * CiscoWorks 1105 Wireless LAN Solution Engine (WLSE)\n * Cisco Ethernet Subscriber Solution Engine (ESSE)\n\n The following products, which implement SSL, are not affected by this\n vulnerability. \n\n * Cisco VPN 3000 Series Concentrators\n\n CatOS does not implement SSL and is not vulnerable. \n\n No other Cisco products are currently known to be affected by this\n vulnerability. This vulnerability is still being actively investigated\n across Cisco products and status of some products has still not been\n determined. \n\nDetails\n\n Secure Sockets Layer (SSL), is a protocol used to encrypt the data\n transferred over an TCP session. SSL in Cisco products is mainly used by\n the HyperText Transfer Protocol Secure (HTTPS) web service for which the\n default TCP port is 443. The affected products, listed above, are only\n vulnerable if they have the HTTPS service enabled and the access to the\n service is not limited to trusted hosts or network management\n workstations. \n\n To check if the HTTPS service is enabled one can do the following:\n\n 1. Check the configuration on the device to verify the status of the\n HTTPS service. \n 2. Try to connect to the device using a standard web browser that\n supports SSL using a URL similar to https://ip_address_of_device/. \n 3. Try and connect to the default HTTPS port, TCP 443, using Telnet. \n telnet ip_address_of_device 443. If the session connects the service\n is enabled and accessible. This\n crash on many Cisco products would cause the device to reload. \n\n A third vulnerability described in the NISCC advisory is a bug in older\n versions of OpenSSL, versions before 0.9.6d, that can also lead to a\n Denial of Service attack. None of the Cisco OpenSSL implementations are\n known to be affected by this older OpenSSL issue. \n\n * Cisco IOS - All 12.1(11)E and later IOS software crypto (56i and k2)\n image releases in the 12.1E release train for the Cisco 7100 and 7200\n Series Routers are affected by this vulnerability. All IOS software\n crypto (k8, k9, and k91) image releases in the 12.2SY release train\n for the Cisco Catalyst 6500 Series and Cisco 7600 Series Routers are\n affected by this vulnerability. The SSH implementation in IOS is not\n dependent on any OpenSSL code. SSH implementations in IOS do not\n handle certificates, yet, and therefore do not use any SSL code for\n SSH. OpenSSL in 12.1E and 12.2SY release trains is only used for\n providing the HTTPS and VPN Device Manager (VDM) services. This\n vulnerability is documented in the Cisco Bug Toolkit (registered\n customers only) as Bug ID CSCee00041. The HTTPS web service, that uses\n the OpenSSL code, on the device is disabled by default. The no ip http\n secure-server command may be used to disable the HTTPS web service on\n the device, if required. The SSH and IPSec services in IOS are not\n vulnerable to this vulnerability. \n * Cisco PIX Firewall - PIX 6.x releases are affected by this\n vulnerability. PIX 5.x releases do not contain any SSL code and are\n not vulnerable. This vulnerability is documented in the Cisco Bug\n Toolkit (registered customers only) as Bug ID CSCed90672. \n * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500\n Series and Cisco 7600 Series routers - This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCee02055. \n * Cisco MDS 9000 Series Multilayer Switches - This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCed96246. \n * Cisco Content Service Switch (CSS) 11000 series - WebNS version 6.x\n and 7.x are affected by this vulnerability. This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCee01234 for SCM and is documented in the Cisco Bug Toolkit\n (registered customers only) as Bug ID CSCee01240 for the SSL module. \n * Cisco Global Site Selector (GSS) 4480 - This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCee01057. \n * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common\n Management Foundation (CMF) version 2.1 - This vulnerability is\n documented in the Cisco Bug Toolkit (registered customers only) as Bug\n ID CSCsa13748. \n * Cisco Access Registrar (CAR) - This vulnerability is documented in the\n Cisco Bug Toolkit (registered customers only) as Bug ID CSCee01956. \n\n The Internetworking Terms and Cisco Systems Acronyms online guides can be\n found at http://www.cisco.com/univercd/cc/td/doc/cisintwk/. \n\nImpact\n\n An affected network device running an SSL server based on the OpenSSL\n implementation may be vulnerable to a Denial of Service (DoS) attack. \n\nSoftware Versions and Fixes\n\n * Cisco IOS -\n\n +----------------------------------------+\n |Release| Fixed Releases |Availability |\n | Train | | |\n |-------+------------------+-------------|\n |12.2SY |12.2(14)SY4 |March 25 |\n |-------+------------------+-------------|\n | |12.1(13)E14 |April 8 |\n |12.1E |12.1.(19)E7 |April 8 |\n | |12.1(20)E3 |April 26 |\n +----------------------------------------+\n\n * Cisco PIX Firewall - The vulnerability is fixed in software releases\n 6.0(4)102, 6.1(5)102, 6.2(3)107, and 6.3(3)124. These engineering\n builds may be obtained by contacting the Cisco Technical Assistance\n Center (TAC). TAC Contact information is given in the Obtaining Fixed\n Software section below. \n * Cisco Firewall Services Module (FWSM) for the Cisco Catalyst 6500\n Series and Cisco 7600 Series routers - The vulnerability is fixed in\n software release 1.1.3(14) which will be available by Monday, 22 of\n March, 2004. This engineering builds may be obtained by contacting the\n Cisco Technical Assistance Center (TAC). TAC Contact information is\n given in the Obtaining Fixed Software section below. \n * Cisco MDS 9000 Series Multilayer Switches - No fixed software release\n or software availability date has been determined yet. \n * Cisco Content Service Switch (CSS) 11000 series -No fixed software\n release or software availability date has been determined yet. \n * Cisco Global Site Selector (GSS) 4480 - No fixed software release or\n software availability date has been determined yet. \n * CiscoWorks Common Services (CWCS) version 2.2 and CiscoWorks Common\n Management Foundation (CMF) version 2.1 - No fixed software release or\n software availability date has been determined yet. \n * Cisco Access Registrar (CAR) - The vulnerability is fixed in software\n release 3.5.0.12 which will be available by Friday, 26 of March, 2004. \n\nObtaining Fixed Software\n\n Cisco is offering free software upgrades to address this vulnerability for\n all affected customers. \n\n Customers may only install and expect support for the feature sets they\n have purchased. By installing, downloading, accessing or otherwise using\n such software upgrades, Customers agree to be bound by the terms of\n Cisco\u0027s software license terms found at\n http://www.cisco.com/public/sw-license-agreement.html, or as otherwise set\n forth at the Cisco Connection Online Software Center at\n http://www.cisco.com/public/sw-center/sw-usingswc.shtml. \n\n Customers with contracts should obtain upgraded software through their\n regular update channels. For most customers, this means that upgrades\n should be obtained through the Software Center on Cisco\u0027s worldwide\n website at http://www.cisco.com/tacpage/sw-center. To access the software\n download URL, you must be a registered user and you must be logged in. \n\n Customers whose Cisco products are provided or maintained through a prior\n or existing agreement with third-party support organizations such as Cisco\n Partners, authorized resellers, or service providers, should contact that\n support organization for assistance with obtaining the software\n upgrade(s). \n\n Customers who purchase direct from Cisco but who do not hold a Cisco\n service contract and customers who purchase through third-party vendors\n but are unsuccessful at obtaining fixed software through their point of\n sale should get their upgrades by contacting the Cisco Technical\n Assistance Center (TAC) using the contact information listed below. In\n these cases, customers are entitled to obtain a free upgrade to a later\n version of the same release or as indicated by the applicable corrected\n software version in the Software Versions and Fixes section (noted above). \n\n Cisco TAC contacts are as follows:\n\n * +1 800 553 2447 (toll free from within North America)\n * +1 408 526 7209 (toll call from anywhere in the world)\n * e-mail: tac@cisco.com\n\n See http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for\n additional TAC contact information, including special localized telephone\n numbers and instructions and e-mail addresses for use in various\n languages. \n\n Please have your product serial number available and give the URL of this\n notice as evidence of your entitlement to a upgrade. Upgrades for\n non-contract customers must be requested through the TAC. \n\n Please do not contact either \"psirt@cisco.com\" or\n \"security-alert@cisco.com\" for software upgrades. \n\nWorkarounds\n\n The Cisco PSIRT recommends that affected users upgrade to a fixed software\n version of code as soon as it is available. \n\n * Restrict access to the HTTPS server on the network device. Allow\n access to the network device only from trusted workstations by using\n access lists / MAC filters that are available on the affected\n platforms. \n * Disable the SSL server / service on the network device. This\n workaround must be weighed against the need for secure communications\n with the vulnerable device. \n\nExploitation and Public Announcements\n\n The Cisco PSIRT is not aware of any malicious use of the vulnerability\n described in this advisory. \n\n This vulnerability was reported to Cisco PSIRT by NISCC. \n\nStatus of This Notice: INTERIM\n\n This is an interim advisory. Although Cisco cannot guarantee the accuracy\n of all statements in this advisory, all of the facts have been checked to\n the best of our ability. Cisco does not anticipate issuing updated\n versions of this advisory unless there is some material change in the\n facts. Should there be a significant change in the facts, Cisco may update\n this advisory. \n\n A stand-alone copy or paraphrase of the text of this security advisory\n that omits the distribution URL in the following section is an\n uncontrolled copy, and may lack important information or contain factual\n errors. \n\nDistribution\n\n This advisory will be posted on Cisco\u0027s worldwide website at\n http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml . \n\n In addition to worldwide web posting, a text version of this notice is\n clear-signed with the Cisco PSIRT PGP key having the fingerprint 8C82 5207\n 0CA9 ED40 1DD2 EE2A 7B31 A8CF 32B6 B590 and is posted to the following\n e-mail and Usenet news recipients. \n\n * cust-security-announce@cisco.com\n * first-teams@first.org (includes CERT/CC)\n * bugtraq@securityfocus.com\n * vulnwatch@vulnwatch.org\n * cisco@spot.colorado.edu\n * cisco-nsp@puck.nether.net\n * full-disclosure@lists.netsys.com\n * comp.dcom.sys.cisco@newsgate.cisco.com\n\n Future updates of this advisory, if any, will be placed on Cisco\u0027s\n worldwide website, but may or may not be actively announced on mailing\n lists or newsgroups. Users concerned about this problem are encouraged to\n check the above URL for any updates. \n\nRevision History\n\n +------------------------------------------+\n |Revision 1.0|2004-March-17|Initial |\n | | |release. |\n +------------------------------------------+\n\nCisco Security Procedures\n\n Complete information on reporting security vulnerabilities in Cisco\n products, obtaining assistance with security incidents, and registering to\n receive security information from Cisco, is available on Cisco\u0027s worldwide\n website at\n http://www.cisco.com/warp/public/707/sec_incident_response.shtml. This\n includes instructions for press inquiries regarding Cisco security\n notices. All Cisco security advisories are available at\n http://www.cisco.com/go/psirt. \n\n This advisory is copyright 2004 by Cisco Systems, Inc. This advisory may\n be redistributed freely after the release date given at the top of the\n text, provided that redistributed copies are complete and unmodified,\n including all date and version information. \n\n ----------------------------------------------------------------------\n-----BEGIN PGP SIGNATURE-----\nComment: PGP Signed by Sharad Ahlawat, Cisco Systems PSIRT\n\niD8DBQFAWFvZezGozzK2tZARAqIwAKDXDMLAY6eDYyU8y1MhKZUto2SRxwCg+oid\n7AhsNlLsNVSLwTRKTHSigu0=\n=gtba\n-----END PGP SIGNATURE-----\n. Any\napplication that makes use of OpenSSL\u0027s SSL/TLS library may be\naffected. Any application that makes use of OpenSSL\u0027s SSL/TLS library\nmay be affected. \n\nRecommendations\n---------------\n\nUpgrade to OpenSSL 0.9.7d or 0.9.6m. Recompile any OpenSSL applications\nstatically linked to OpenSSL libraries. \n\nOpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and\nFTP from the following master locations (you can find the various FTP\nmirrors under http://www.openssl.org/source/mirror.html):\n\n ftp://ftp.openssl.org/source/\n\nThe distribution file names are:\n\n o openssl-0.9.7d.tar.gz\n MD5 checksum: 1b49e90fc8a75c3a507c0a624529aca5\n \n o openssl-0.9.6m.tar.gz [normal]\n MD5 checksum: 1b63bfdca1c37837dddde9f1623498f9\n o openssl-engine-0.9.6m.tar.gz [engine]\n MD5 checksum: 4c39d2524bd466180f9077f8efddac8c\n\nThe checksums were calculated using the following command:\n\n openssl md5 openssl-0.9*.tar.gz\n\nCredits\n-------\n\nPatches for these issues were created by Dr Stephen Henson\n(steve@openssl.org) of the OpenSSL core team. The OpenSSL team would\nlike to thank Codenomicon for supplying the TLS Test Tool which was\nused to discover these vulnerabilities, and Joe Orton of Red Hat for\nperforming the majority of the testing. \n\nReferences\n----------\n\nhttp://www.codenomicon.com/testtools/tls/\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112\n\nURL for this Security Advisory:\nhttp://www.openssl.org/news/secadv_20040317.txt\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0079"
},
{
"db": "CERT/CC",
"id": "VU#288574"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000086"
},
{
"db": "CNVD",
"id": "CNVD-2004-0791"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "14567"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "VULHUB",
"id": "VHN-8509"
},
{
"db": "PACKETSTORM",
"id": "32887"
},
{
"db": "PACKETSTORM",
"id": "32886"
}
],
"trust": 3.96
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-8509",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-8509"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2004-0079",
"trust": 4.2
},
{
"db": "CERT/CC",
"id": "VU#288574",
"trust": 3.3
},
{
"db": "BID",
"id": "9899",
"trust": 2.8
},
{
"db": "USCERT",
"id": "TA04-078A",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "17398",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "18247",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "11139",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "17381",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "17401",
"trust": 1.7
},
{
"db": "XF",
"id": "15505",
"trust": 0.8
},
{
"db": "SECTRACK",
"id": "1009458",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000086",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200411-124",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2004-0791",
"trust": 0.6
},
{
"db": "BID",
"id": "14567",
"trust": 0.3
},
{
"db": "BID",
"id": "13139",
"trust": 0.3
},
{
"db": "PACKETSTORM",
"id": "32886",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "32887",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-8509",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#288574"
},
{
"db": "CNVD",
"id": "CNVD-2004-0791"
},
{
"db": "VULHUB",
"id": "VHN-8509"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "14567"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "PACKETSTORM",
"id": "32887"
},
{
"db": "PACKETSTORM",
"id": "32886"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-124"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000086"
},
{
"db": "NVD",
"id": "CVE-2004-0079"
}
]
},
"id": "VAR-200411-0172",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-8509"
}
],
"trust": 0.52271296
},
"last_update_date": "2026-03-09T20:53:02.960000Z",
"patch": {
"_id": null,
"data": [
{
"title": "openssl",
"trust": 0.8,
"url": "http://www.checkpoint.com/services/techsupport/alerts/openssl.html"
},
{
"title": "cisco-sa-20040317-openssl",
"trust": 0.8,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml"
},
{
"title": "HPSBMA01037",
"trust": 0.8,
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c01007278"
},
{
"title": "HPSBUX01019",
"trust": 0.8,
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00944046"
},
{
"title": "HPSBUX01011",
"trust": 0.8,
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00897351"
},
{
"title": "HPSBUX01019",
"trust": 0.8,
"url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX01019.html"
},
{
"title": "HPSBUX01011",
"trust": 0.8,
"url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX01011.html"
},
{
"title": "NetScreen Advisory 58466",
"trust": 0.8,
"url": "http://www.juniper.net/support/security/alerts/adv58466-2.txt"
},
{
"title": "openssl096",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/update/list.php?errata_id=155"
},
{
"title": "AXSA-2005-129:1",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/update/list.php?errata_id=210"
},
{
"title": "NetBSD-SA2004-005",
"trust": 0.8,
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc"
},
{
"title": "016: RELIABILITY FIX: March 17, 2004",
"trust": 0.8,
"url": "http://www.openbsd.org/errata34.html#openssl"
},
{
"title": "secadv_20040317",
"trust": 0.8,
"url": "http://www.openssl.org/news/secadv_20040317.txt"
},
{
"title": "RHSA-2005:830",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2005-830.html"
},
{
"title": "RHSA-2005:829",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2005-829.html"
},
{
"title": "RHSA-2004:120",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2004-120.html"
},
{
"title": "RHSA-2004:121",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2004-121.html"
},
{
"title": "57524",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-1"
},
{
"title": "57571",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-1"
},
{
"title": "57571",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-3"
},
{
"title": "57524",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-3"
},
{
"title": "4 Apache Security Update 2.0.1",
"trust": 0.8,
"url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng"
},
{
"title": "19387",
"trust": 0.8,
"url": "http://kb.trendmicro.com/solutions/solutionDetail.asp?solutionID=19387"
},
{
"title": "TLSA-2004-9",
"trust": 0.8,
"url": "http://www.turbolinux.com/security/2004/TLSA-2004-9.txt"
},
{
"title": "OpenSSL \u306b\u95a2\u3059\u308b\u8106\u5f31\u6027",
"trust": 0.8,
"url": "http://www.checkpoint.co.jp/techsupport/alerts/openssl.html"
},
{
"title": "RHSA-2004:120",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2004-120J.html"
},
{
"title": "RHSA-2005:830",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-830J.html"
},
{
"title": "RHSA-2005:829",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-829J.html"
},
{
"title": "openssl \u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30db\u30fc\u30eb",
"trust": 0.8,
"url": "http://vinelinux.org/errata/25x/20040319-1.html"
},
{
"title": "TLSA-2004-9",
"trust": 0.8,
"url": "http://www.turbolinux.co.jp/security/2004/TLSA-2004-9j.txt"
},
{
"title": "IPCOM\u30b7\u30ea\u30fc\u30ba\u306eOpenSSL\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://primeserver.fujitsu.com/ipcom/support/security20040325/"
},
{
"title": "[\u91cd\u8981] OpenSSL\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://jp.fujitsu.com/support/security/backnumber/2004/0325/"
},
{
"title": "224012",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/cert/niscc.html#224012-OpenSSL"
},
{
"title": "OpenSSL Repair measures for denial of service attack vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=169017"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200411-124"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000086"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-476",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0079"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.7,
"url": "http://www.openssl.org/news/secadv_20040317.txt"
},
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/9899"
},
{
"trust": 2.5,
"url": "http://www.us-cert.gov/cas/techalerts/ta04-078a.html"
},
{
"trust": 2.5,
"url": "http://www.kb.cert.org/vuls/id/288574"
},
{
"trust": 2.5,
"url": "http://www.ciac.org/ciac/bulletins/o-101.shtml"
},
{
"trust": 2.1,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml"
},
{
"trust": 2.0,
"url": "http://support.avaya.com/elmodocs2/security/asa-2005-239.htm"
},
{
"trust": 1.8,
"url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2005/aug/msg00000.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2005//aug/msg00001.html"
},
{
"trust": 1.7,
"url": "http://docs.info.apple.com/article.html?artnum=61798"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2004/dsa-465"
},
{
"trust": 1.7,
"url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html"
},
{
"trust": 1.7,
"url": "http://fedoranews.org/updates/fedora-2004-095.shtml"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/archives/fedora-announce-list/2005-october/msg00087.html"
},
{
"trust": 1.7,
"url": "http://security.gentoo.org/glsa/glsa-200403-03.xml"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2004:023"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2621"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5770"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a870"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a975"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9779"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2004-120.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2004-121.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2004-139.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2005-829.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2005-830.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/11139"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/17381"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/17398"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/17401"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/18247"
},
{
"trust": 1.7,
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524"
},
{
"trust": 1.7,
"url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html"
},
{
"trust": 1.7,
"url": "http://www.trustix.org/errata/2004/0012"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505"
},
{
"trust": 1.6,
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2"
},
{
"trust": 1.6,
"url": "http://support.lexmark.com/index?page=content\u0026id=te88\u0026locale=en\u0026userlocale=en_us"
},
{
"trust": 1.6,
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2"
},
{
"trust": 1.1,
"url": "http://www.uniras.gov.uk/l1/l2/l3/alerts2004/alert-1204.txt"
},
{
"trust": 1.1,
"url": "ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-04:05.openssl.asc"
},
{
"trust": 1.1,
"url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2004-005.txt.asc"
},
{
"trust": 1.1,
"url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.10/scosa-2004.10.txt"
},
{
"trust": 0.8,
"url": "http://www.openssl.org"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0079"
},
{
"trust": 0.8,
"url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20040317-00389.xml"
},
{
"trust": 0.8,
"url": "http://xforce.iss.net/xforce/xfdb/15505"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/wr/2004/wr041801.txt"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/wr/2004/wr041201.txt"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/wr/2004/wr041301.txt"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/wr/2004/wr041701.txt"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta04-078a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/niscc/niscc-224012/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta04-078a"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0079"
},
{
"trust": 0.8,
"url": "http://www.cpni.gov.uk/docs/re-20040317-00389.pdf?lang=en"
},
{
"trust": 0.8,
"url": "http://www.securiteam.com/securitynews/5op0g20caa.html"
},
{
"trust": 0.8,
"url": "http://www.securitytracker.com/alerts/2004/mar/1009458.html"
},
{
"trust": 0.8,
"url": "http://www.cyberpolice.go.jp/important/20040318_082932.html"
},
{
"trust": 0.6,
"url": "https://rhn.redhat.com/errata/rhsa-2004-119.html"
},
{
"trust": 0.6,
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57524"
},
{
"trust": 0.3,
"url": "http://www.4d.com/products/4dwsv.html"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/japple/css/japple?page=avaya.css.openpage\u0026temp.template.name=securityadvisory"
},
{
"trust": 0.3,
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000827"
},
{
"trust": 0.3,
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000834"
},
{
"trust": 0.3,
"url": "ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf1-readme.txt"
},
{
"trust": 0.3,
"url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1256"
},
{
"trust": 0.3,
"url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1257"
},
{
"trust": 0.3,
"url": "http://www.netscreen.com/services/security/alerts/adv58466-signed.txt"
},
{
"trust": 0.3,
"url": "http://www.stonesoft.com/document/art/3123.html"
},
{
"trust": 0.3,
"url": "http://www.checkpoint.com/techsupport/alerts/openssl.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2004-120.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2004-139.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2005-830.html"
},
{
"trust": 0.3,
"url": "http://www.bluecoat.com/support/knowledge/advisory_openssl_can-2004-0079.html"
},
{
"trust": 0.3,
"url": "http://www.apple.com/support/downloads/securityupdate_2004-04-05_(10_3_3).html"
},
{
"trust": 0.3,
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm"
},
{
"trust": 0.3,
"url": "http://www.securecomputing.com/pdf/52110relnotes.pdf"
},
{
"trust": 0.3,
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57571"
},
{
"trust": 0.3,
"url": "http://www.tarantella.com/security/bulletin-10.html"
},
{
"trust": 0.3,
"url": "http://www.adiscon.com/common/en/advisory/2004-03-18.asp"
},
{
"trust": 0.3,
"url": "http://www.litespeedtech.com"
},
{
"trust": 0.3,
"url": "/archive/1/357672"
},
{
"trust": 0.3,
"url": "http://www.info.apple.com/usen/security/security_updates.html"
},
{
"trust": 0.3,
"url": "http://www.suresec.org/advisories/adv5.pdf"
},
{
"trust": 0.3,
"url": "http://www.apple.com"
},
{
"trust": 0.3,
"url": "http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf"
},
{
"trust": 0.3,
"url": "http://www.oracle.com/index.html"
},
{
"trust": 0.3,
"url": "http://www.peoplesoft.com:80/corp/en/support/security_index.jsp"
},
{
"trust": 0.3,
"url": "/archive/1/395699"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2004-0079"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2004-0112"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=107953412903636\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000834"
},
{
"trust": 0.1,
"url": "http://support.lexmark.com/index?page=content\u0026amp;id=te88\u0026amp;locale=en\u0026amp;userlocale=en_us"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=108403806509920\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026amp;y=2004\u0026amp;m=slackware-security.455961"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/public/sw-license-agreement.html,"
},
{
"trust": 0.1,
"url": "https://ip_address_of_device/."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/univercd/cc/td/doc/cisintwk/."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/tacpage/sw-center."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/707/sec_incident_response.shtml."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/687/directory/dirtac.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/public/sw-center/sw-usingswc.shtml."
},
{
"trust": 0.1,
"url": "http://www.codenomicon.com/testtools/tls/"
},
{
"trust": 0.1,
"url": "http://www.openssl.org/source/mirror.html):"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0112"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0079"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#288574"
},
{
"db": "VULHUB",
"id": "VHN-8509"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "14567"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "PACKETSTORM",
"id": "32887"
},
{
"db": "PACKETSTORM",
"id": "32886"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-124"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000086"
},
{
"db": "NVD",
"id": "CVE-2004-0079"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#288574",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2004-0791",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-8509",
"ident": null
},
{
"db": "BID",
"id": "9899",
"ident": null
},
{
"db": "BID",
"id": "14567",
"ident": null
},
{
"db": "BID",
"id": "13139",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "32887",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "32886",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-200411-124",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000086",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2004-0079",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2004-03-17T00:00:00",
"db": "CERT/CC",
"id": "VU#288574",
"ident": null
},
{
"date": "2004-03-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2004-0791",
"ident": null
},
{
"date": "2004-11-23T00:00:00",
"db": "VULHUB",
"id": "VHN-8509",
"ident": null
},
{
"date": "2004-03-17T00:00:00",
"db": "BID",
"id": "9899",
"ident": null
},
{
"date": "2005-08-15T00:00:00",
"db": "BID",
"id": "14567",
"ident": null
},
{
"date": "2005-04-12T00:00:00",
"db": "BID",
"id": "13139",
"ident": null
},
{
"date": "2004-03-17T15:44:08",
"db": "PACKETSTORM",
"id": "32887",
"ident": null
},
{
"date": "2004-03-17T14:36:13",
"db": "PACKETSTORM",
"id": "32886",
"ident": null
},
{
"date": "2003-07-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200411-124",
"ident": null
},
{
"date": "2007-04-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2004-000086",
"ident": null
},
{
"date": "2004-11-23T05:00:00",
"db": "NVD",
"id": "CVE-2004-0079",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2004-03-26T00:00:00",
"db": "CERT/CC",
"id": "VU#288574",
"ident": null
},
{
"date": "2004-03-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2004-0791",
"ident": null
},
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-8509",
"ident": null
},
{
"date": "2015-03-19T08:20:00",
"db": "BID",
"id": "9899",
"ident": null
},
{
"date": "2006-05-05T23:10:00",
"db": "BID",
"id": "14567",
"ident": null
},
{
"date": "2006-05-05T23:30:00",
"db": "BID",
"id": "13139",
"ident": null
},
{
"date": "2021-11-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200411-124",
"ident": null
},
{
"date": "2007-04-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2004-000086",
"ident": null
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2004-0079",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "network",
"sources": [
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "14567"
},
{
"db": "BID",
"id": "13139"
}
],
"trust": 0.9
},
"title": {
"_id": null,
"data": "OpenSSL contains null-pointer assignment in do_change_cipher_spec() function",
"sources": [
{
"db": "CERT/CC",
"id": "VU#288574"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "14567"
},
{
"db": "BID",
"id": "13139"
}
],
"trust": 0.9
}
}
VAR-200806-0575
Vulnerability from variot - Updated: 2026-03-09 20:26SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. SNMPv3 The implementation of contains an authentication bypass vulnerability because it does not properly handle crafted packets. SNMP (Simple Network Management Protocol) Is a widely used protocol for monitoring and managing network devices. SNMPv3 Supports security features such as authentication and privacy control. SNMPv3 In the authentication of HMAC (keyed-Hash Message Authentication Code) Is used. This code is generated by combining a private key and a cryptographic hash function. SNMPv3 Depending on the implementation of, there is a possibility that authentication may be bypassed by processing specially crafted packets due to vulnerability in authentication processing.By remote third party SNMP The object may be read or modified. Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error. Successfully exploiting this issue will allow attackers to gain unauthorized access to the affected application. Net-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. An attacker could exploit this vulnerability to read and modify any SNMP object accessible using the authenticated credentials logged into the system. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities
Document ID: 107408
Advisory ID: cisco-sa-20080610-snmpv3
http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
Revision 1.0
For Public Release 2008 June 10 1600 UTC (GMT)
Summary
Multiple Cisco products contain either of two authentication vulnerabilities in the Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the disclosure of network information or may enable an attacker to perform configuration changes to vulnerable devices. The SNMP server is an optional service that is disabled by default in Cisco products. Only SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact of the vulnerabilities described in this document.
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability Note VU#878044 to these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has also been assigned to these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
Affected Products
Vulnerable Products +------------------
The following Cisco products are vulnerable.
- Cisco IOS
- Cisco IOS-XR
- Cisco Catalyst Operating System (CatOS)
- Cisco NX-OS
- Cisco Application Control Engine (ACE) Module
- Cisco ACE Appliance
- Cisco ACE XML Gateway
- Cisco MDS 9000 Series Multilayer Fabric Switches
Note: The SNMP server is disabled by default. These vulnerabilities only impact devices that are configured for SNMPv3.
To determine the version of SNMP configured in Cisco IOS, CatOS and IOS-XR, log in to the device and issue the show snmp group command. The security model field indicates the version of SNMP configured. The output "usm" is the abbreviation for user-based security model and this indicates SNMPv3 is configured.
Cisco IOS
router#show snmp group
groupname: test security model:v3 noauth
readview : v1default writeview: <no writeview specified>
notifyview: <no notifyview specified>
row status: active
Cisco CatOS
5500-1 (enable) show snmp group
Security Model: v3
Security Name: userv3
Group Name: groupv3
Storage Type: nonvolatile
Row Status: active
Cisco IOS-XR
RP/0/RP0/CPU0:ios#show snmp group
groupname: test security model:usm
readview : v1default writeview: -
notifyview: v1default
row status: nonVolatile
IronPort +-------
IronPort C-Series, X-Series, and M-Series appliances utilize code covered by this advisory, but are not susceptible to any security risk. IronPort C-Series, X-Series, and M-Series incorporate the libraries under the advisory to provide anonymous read-only access to system health data. There is no risk of escalated authorization privileges allowing a 3rd party to make any configuration changes to the IronPort devices. IronPort S-Series and Encryption Appliances are not affected by this advisory. This announcement has also been posted on the IronPort Support Portal, available to IronPort customers:
https://supportportal.ironport.com/irppcnctr/srvcd?u=http://secure-support.soma.ironport.com/announcement&sid=900016
Products Confirmed Not Vulnerable +--------------------------------
The following Cisco products are confirmed not vulnerable:
- Cisco PIX Security Appliances
- Cisco ASA Security Appliances
- Cisco Firewall Services Module (FWSM)
- Cisco Security Monitoring, Analysis, and Response System (MARS)
- Cisco Network Admission Control (NAC) Appliance
- CiscoWorks Wireless LAN Solution Engine (WLSE)
No other Cisco products are currently known to be affected by these vulnerabilities.
There are three general types of SNMP operations: "get" requests to request information, "set" requests that modify the configuration of a remote device, and "trap" messages that provide a monitoring function. SNMP requests and traps are transported over User Datagram Protocol (UDP) and are received at the assigned destination port numbers 161 and 162, respectively.
SNMPv3 provides secure access to devices by authenticating and encrypting packets over the network. RFC2574 defines the use of HMAC-MD5-96 and HMAC-SHA-96 as the possible authentication protocols for SNMPv3. This advisory identifies two vulnerabilities that are almost identical. Both are specifically related to malformed SNMPv3 packets that manipulate the Hash Message Authentication Code (HMAC). The two vulnerabilities may impact both Secure Hashing Algorithm-1 (SHA-1) and Message-Digest Algorithm 5 (MD5). The vulnerabilities described in this document can be successfully exploited using spoofed SNMPv3 packets.
These vulnerabilities are documented in the following Cisco Bug IDs:
- CSCsf04754 - IOS SNMPv3 HMAC Authentication issue
- CSCsf30109 - IOS-XR SNMPv3 HMAC Authentication issue
- CSCsf29976 - CatOS SNMPv3 HMAC Authentication issue
- CSCsq62662 - ACE XML Gw SNMPv3 HMAC Authentication issue
- CSCsq60664 - ACE Appliance SNMPv3 HMAC Authentication issue
- CSCsq60695 - ACE Module SNMPv3 HMAC Authentication issue
- CSCsq60582 - Nexus SNMPv3 HMAC Authentication issue
Note: Although multiple software defects are listed, this advisory only identifies two vulnerabilities. Because different Cisco products require their own fixes, additional Bug IDs have been assigned.
Vulnerability Scoring Details
Cisco has provided scores for the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding CVSS at
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at
http://intellishield.cisco.com/security/alertmanager/cvss
CSCsf04754 - IOS SNMPv3 HMAC Authentication issue
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
CSCsf30109 - IOS-XR SNMPv3 HMAC Authentication issue
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
CSCsf29976 - CatOS SNMPv3 HMAC Authentication issue
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
CSCsq62662 - ACE XML Gw SNMPv3 HMAC Authentication issue
CVSS Base Score - 9.3
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 7.7
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
CSCsq60664 - ACE Appliance SNMPv3 HMAC Authentication issue
CVSS Base Score - 9.3
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.4
Exploitability - Functional
Remediation Level - Workaround
Report Confidence - Confirmed
CSCsq60695 - ACE Module SNMPv3 HMAC Authentication issue
CVSS Base Score - 9.3
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.4
Exploitability - Functional
Remediation Level - Workaround
Report Confidence - Confirmed
CSCsq60582 - Nexus SNMPv3 HMAC Authentication issue
CVSS Base Score - 9.3
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.4
Exploitability - Functional
Remediation Level - Workaround
Report Confidence - Confirmed
Impact
Successful exploitation of these vulnerabilities could result in the disclosure of sensitive information on a device or allow an attacker to make configuration changes to a vulnerable device that is based on the SNMP configuration.
Software Versions and Fixes
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance.
Each row of the Cisco IOS software table (below) names a Cisco IOS release train. If a given release train is vulnerable, then the earliest possible releases that contain the fix (along with the anticipated date of availability for each, if applicable) are listed in the "First Fixed Release" column of the table. The "Recommended Release" column indicates the releases which have fixes for all the published vulnerabilities at the time of this Advisory. A device running a release in the given train that is earlier than the release in a specific column (less than the First Fixed Release) is known to be vulnerable. Cisco recommends upgrading to a release equal to or later than the release in the "Recommended Releases" column of the table.
+---------------------------------------+ | Affected | Affected | First | | Product | Release | Fixed | | | | Release | |-----------------+----------+----------| | | 6.x | 6.4(23) | | |----------+----------| | Cisco Catalyst | 7.x | 7.6(19) | |Operating |----------+----------| | System (CatOS) | 8.5.x | 8.5(7) | | |----------+----------| | | 8.6.x | 8.6(1) | +---------------------------------------+
Cisco IOS XR +-----------
The following table lists fixed Cisco IOS XR software.
+---------------------------------------------------+ | Cisco | | | | IOS XR | SMU ID | SMU Name | | Version | | | |---------+------------+----------------------------| | 3.2.2 | AA01681 | hfr-base-3.2.2.CSCsf30109 | |---------+------------+----------------------------| | 3.2.3 | AA01682 | hfr-base-3.2.3.CSCsf30109 | |---------+------------+----------------------------| | 3.2.4 | AA01683 | hfr-base-3.2.4.CSCsf30109 | |---------+------------+----------------------------| | 3.2.6 | AA01684 | hfr-base-3.2.6.CSCsf30109 | |---------+------------+----------------------------| | 3.3.0 | AA01685 | hfr-base-3.3.0.CSCsf30109 | |---------+------------+----------------------------| | 3.3.0 | AA01690 | c12k-base-3.3.0.CSCsf30109 | |---------+------------+----------------------------| | 3.3.1 | AA01686 | hfr-base-3.3.1.CSCsf30109 | |---------+------------+----------------------------| | 3.3.1 | AA01688 | c12k-base-3.3.1.CSCsf30109 | |---------+------------+----------------------------| | 3.3.2 | Not | Not vulnerable | | | vulnerable | | |---------+------------+----------------------------| | 3.4.x | Not | Not vulnerable | | | vulnerable | | +---------------------------------------------------+
Cisco NX-OS +----------
The following table lists fixed Cisco NX-OS software.
+----------------------------------------+ | Affected | Affected | First Fixed | | Product | Release | Release | |-----------+-----------+----------------| | Cisco | | 4.0.(2) | | NX-OS | 4.0.(1)a | Available June | | | | 2008 | +----------------------------------------+
Cisco ACE Products +-----------------
The following table lists fixed Cisco Application Control Engine (ACE) software.
+---------------------------------------+ | Affected | Affected | First | | Product | Release | Fixed | | | | Release | |----------------+----------+-----------| | | 3.0(0)A1 | | | Cisco | (6.x) | | | Application | | A2(1.1) | | Control Engine | A2(1.0) | | | (ACE) Module | | | | | A2(1.0a) | | |----------------+----------+-----------| | | A1(7.0) | | | | | | | Cisco | A1(7.0a) | | | Application | | | | Control Engine | A1(7.0b) | A1(8.0a) | | (ACE) | | | | Appliance | A1(7.0c) | | | | | | | | A1(8.0) | | |----------------+----------+-----------| | Cisco | 4.x | | | Application | | 6.0.1 | | Control Engine | 5.x | Available | | (ACE) XML | | June 2008 | | Gateway | 6.0 | | +---------------------------------------+
Cisco MDS software +-----------------
The following table lists fixed Cisco MDS Multilayer Switch software.
+---------------------------------------+ | Affected | Affected | First Fixed | | Product | Release | Release | |-----------+-----------+---------------| | | 2.1 | | | Cisco MDS | | 3.4.1 | | 9000 | 3.0 | Available | | | | June 2008 | | | 3.2 | | +---------------------------------------+
Workarounds
The following workarounds have been identified for these vulnerabilities.
Infrastructure Access Control Lists +----------------------------------
Although it is often difficult to block traffic that transits a network, it is possible to identify traffic that should never be allowed to target infrastructure devices and block that traffic at the border of networks. Infrastructure Access Control Lists (iACLs) are a network security best practice and should be considered as a long-term addition to good network security as well as a workaround for these specific vulnerabilities. The iACL example below should be included as part of the deployed infrastructure access-list which will protect all devices with IP addresses in the infrastructure IP address range:
Note: UDP port 161 is applicable for all versions of SNMP.
!--- Permit SNMP UDP 161 packets from
!--- trusted hosts destined to infrastructure addresses.
access-list 150 permit udp TRUSTED_HOSTS MASK INFRASTRUCTURE_ADDRESSES MASK eq 161
!--- Deny SNMP UDP 161 packets from all
!--- other sources destined to infrastructure addresses.
access-list 150 deny udp any INFRASTRUCTURE_ADDRESSES MASK eq 161
!--- Permit/deny all other Layer 3 and Layer 4 traffic in accordance
!--- with existing security policies and configurations
!--- Permit all other traffic to transit the device.
access-list 150 permit ip any anyinterface serial 2/0ip access-group 150 in
The white paper entitled "Protecting Your Core: Infrastructure Protection Access Control Lists" presents guidelines and recommended deployment techniques for infrastructure protection access lists. This white paper can be obtained at the following link: http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801a1a55.shtml
Control Plane Policing +---------------------
Control Plane Policing (CoPP) can be used to block untrusted SNMP access to the device. Cisco IOS software releases 12.0S, 12.2SX, 12.2S, 12.3T, 12.4, and 12.4T support the CoPP feature. CoPP can be configured on a device to protect the management and control planes and minimize the risk and effectiveness of direct infrastructure attacks by explicitly permitting only authorized traffic that is sent to infrastructure devices in accordance with existing security policies and configurations. The following example, which uses 192.168.100.1 to represent a trusted host, can be adapted to your network.
!--- Deny SNMP UDP traffic from trusted hosts to all IP addresses
!--- configured on all interfaces of the affected device so that
!--- it will be allowed by the CoPP feature
access-list 111 deny udp host 192.168.100.1 any eq 161
!--- Permit all other SNMP UDP traffic sent to all IP addresses
!--- configured on all interfaces of the affected device so that it
!--- will be policed and dropped by the CoPP feature
access-list 111 permit udp any any eq 161
!--- Permit (Police or Drop)/Deny (Allow) all other Layer3 and Layer4
!--- traffic in accordance with existing security policies and
!--- configurations for traffic that is authorized to be sent
!--- to infrastructure devices
!--- Create a Class-Map for traffic to be policed by
!--- the CoPP feature
class-map match-all drop-snmpv3-class
match access-group 111
!--- Create a Policy-Map that will be applied to the
!--- Control-Plane of the device.
policy-map drop-snmpv3-traffic
class drop-snmpv3-class
drop
!--- Apply the Policy-Map to the
!--- Control-Plane of the device
control-plane
service-policy input drop-snmpv3-traffic
In the above CoPP example, the access control list entries (ACEs) that match the potential exploit packets with the "permit" action result in these packets being discarded by the policy-map "drop" function, while packets that match the "deny" action (not shown) are not affected by the policy-map drop function.
Please note that the policy-map syntax is different in the 12.2S and 12.0S Cisco IOS trains:
policy-map drop-snmpv3-traffic
class drop-snmpv3-class
police 32000 1500 1500 conform-action drop exceed-action drop
Additional information on the configuration and use of the CoPP feature is available at the following links:
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6642/prod_white_paper0900aecd804fa16a.html
and
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gtrtlimt.html
Transit Access Control Lists +---------------------------
Filters that deny SNMP packets using UDP port 161 should be deployed throughout the network as part of a Transit Access Control List (tACL) policy for protection of traffic that enters the network at ingress access points. This policy should be configured to protect the network device where the filter is applied and other devices behind it. Filters for SNMP packets that use UDP port 161 should also be deployed in front of vulnerable network devices so that traffic is only allowed from trusted clients.
Additional information about tACLs is available in "Transit Access Control Lists: Filtering at Your Edge:"
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801afc76.shtml
Hardening Guide Statement +------------------------
Customers are advised to review the "Fortifying the Simple Network Management Protocol" section of the "Cisco Guide to Harden Cisco IOS Devices" for information on configuring an IOS device for SNMPv3 authentication and privacy:
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml#fortify
Cisco IOS authPriv Configuration +-------------------------------
Enabling the SNMPv3 privacy subsystem (if it is not already in use) is a short-term workaround for users who are unable to upgrade in a timely fashion. This subsystem is used to encrypt SNMPv3 traffic using a shared secret.
In Cisco IOS, administrators can enable this workaround by using the authPriv SNMPv3 feature. Only Cisco IOS crypto images can run the authPriv feature.
Note: Ensure that the management application supports SNMPv3 authPriv before implementing this feature.
Applied Mitigation Bulletin +--------------------------
Additional mitigation techniques that can be deployed on Cisco devices within the network are available in the Cisco Applied Intelligence companion document for this advisory: http://www.cisco.com/warp/public/707/cisco-amb-20080610-SNMPv3.shtml
Obtaining Fixed Software
Cisco has released free software updates that address these vulnerabilities. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html or as otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades.
Customers with Service Contracts +-------------------------------
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations +------------------------------------------------
Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed.
Customers without Service Contracts +----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows.
- +1 800 553 2447 (toll free from within North America)
- +1 408 526 7209 (toll call from anywhere in the world)
- e-mail: tac@cisco.com
Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC.
Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages.
Exploitation and Public Announcements
Cisco is releasing this combined Cisco IOS and non-IOS product advisory out of our normal bi-yearly IOS security advisory cycle due to public disclosure of these vulnerabilities.
Cisco is not aware of any malicious exploitation of these vulnerabilities.
These vulnerabilities were reported to Cisco by Dr. Tom Dunigan of the University of Tennessee and Net-SNMP in cooperation with the CERT Coordination Center.
Status of this Notice: FINAL
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory is posted on Cisco's worldwide website at :
http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients.
- cust-security-announce@cisco.com
- first-teams@first.org
- bugtraq@securityfocus.com
- vulnwatch@vulnwatch.org
- cisco@spot.colorado.edu
- cisco-nsp@puck.nether.net
- full-disclosure@lists.grok.org.uk
- comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.
Revision History
+---------------------------------------+ | Revision | | Initial | | 1.0 | 2008-June-10 | public | | | | release | +---------------------------------------+
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.
Updated: Jun 10, 2008 Document ID: 107408
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (Darwin)
iD8DBQFITruJ86n/Gc8U/uARAiuNAJwIq42/p8CUh7Dc88nAn9a1pfhhqgCfWXjv 8bYhCD0EKNQ28koObq4S+vQ= =zOBL -----END PGP SIGNATURE----- .
The authentication code reads the length to be checked from sender input, this allows the sender to supply single byte HMAC code and have a 1 in 256 chance of matching the correct HMAC and authenticating, as only the first byte will be checked. The sender would need to know a valid username.
Currently Net-SNMP and UCD-SNMP are known to be vulnerable, other SNMP implementations may also be affected. The eCos project includes code derived from UCD-SNMP and is therefore also affected.
Affected version:
Net-SNMP <= 5.4.1, <= 5.3.2, <= 5.2.4 UCD-SNMP, all versions eCos, all versions
Fixed version:
Net-SNMP >= 5.4.1.1, >= 5.3.2.1, >= 5.2.4.1 UCD-SNMP, N/A eCos, N/A
Credit: this issue was reported by CERT/CC, it is tracked as VU#878044.
CVE: CVE-2008-0960
Timeline: 2008-06-05: CERT/CC reports VU#878044 to oCERT requesting joint coordination 2008-06-05: contacted affected vendors 2008-06-06: added eCos to affected packages 2008-06-09: patched net-snmp packages released 2008-06-09: advisory release
References: http://sourceforge.net/forum/forum.php?forum_id=833770 http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380 http://www.kb.cert.org/vuls/id/878044
Links: http://www.net-snmp.org http://www.ece.ucdavis.edu/ucd-snmp http://ecos.sourceware.org
Permalink: http://www.ocert.org/advisories/ocert-2008-006.html
-- Andrea Barisani | Founder & Project Coordinator oCERT | Open Source Computer Emergency Response Team
lcars@ocert.org http://www.ocert.org 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E "Pluralitas non est ponenda sine necessitate" . =========================================================== Ubuntu Security Notice USN-685-1 December 03, 2008 net-snmp vulnerabilities CVE-2008-0960, CVE-2008-2292, CVE-2008-4309 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libsnmp-perl 5.2.1.2-4ubuntu2.3 libsnmp9 5.2.1.2-4ubuntu2.3
Ubuntu 7.10: libsnmp-perl 5.3.1-6ubuntu2.2 libsnmp10 5.3.1-6ubuntu2.2
Ubuntu 8.04 LTS: libsnmp-perl 5.4.1~dfsg-4ubuntu4.2 libsnmp15 5.4.1~dfsg-4ubuntu4.2
Ubuntu 8.10: libsnmp15 5.4.1~dfsg-7.1ubuntu6.1
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
Wes Hardaker discovered that the SNMP service did not correctly validate HMAC authentication requests. An unauthenticated remote attacker could send specially crafted SNMPv3 traffic with a valid username and gain access to the user's views without a valid authentication passphrase. (CVE-2008-0960)
John Kortink discovered that the Net-SNMP Perl module did not correctly check the size of returned values. If a user or automated system were tricked into querying a malicious SNMP server, the application using the Perl module could be made to crash, leading to a denial of service. This did not affect Ubuntu 8.10. (CVE-2008-2292)
It was discovered that the SNMP service did not correctly handle large GETBULK requests. If an unauthenticated remote attacker sent a specially crafted request, the SNMP service could be made to crash, leading to a denial of service. (CVE-2008-4309)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz
Size/MD5: 75402 9655d984a47cec8e27efa4db0b227870
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc
Size/MD5: 838 17a17230a005c1acfd0569757e728fad
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz
Size/MD5: 3869893 34159770a7fe418d99fdd416a75358b1
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb
Size/MD5: 1152306 f7647cee4df8db87ab48c0d05635a973
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb
Size/MD5: 822946 b9b852c188937d1fffc06d4da01325d5
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 896620 a78012b3f0f13667081f97dc1a4d62e8
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 1497194 7d55b8d1e4ae0c45753bedcf536a1a5a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 1826252 0550c1401f9bbe5f345fd96484ed369c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 889330 5ad0ddb2c610973166e4dd07769ba3d3
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 797086 18cf4210342b683d3ee24fe995329b55
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 896880 298d27ea1ece6e80bb8931b9a5e61961
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 1268472 acbca43ab7ea747fa3e4636d15ef997c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 1710342 bd27290685bcf1d6a23eb8705d3367e7
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 881838 58121bd9e4c845da7df4e540645e0e13
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 794672 221d1c554bd89f50dc3ac9108a6cef6b
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 913064 45a033b01c4b31ef90a92988bb5fb229
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 1590124 b62aa5477d9307d311c811298b7ec3d9
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 1728094 5214ce9aebe3a8d7a28a1746a81ce8ea
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 898580 86e6c1b5dfb5bf91f63d7c6786b7abae
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 796092 1bab28407224f782b2c3ae04b4647333
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 896832 3d233db9682d5654fdad6bc6b5a649ba
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 1485268 064304ead0ca4653136376e8e9039e74
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 1706490 cb76027eb8167e0866a81b93a4da28ed
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 883182 d1ffc12427d92be51efdba3349e74f9a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 796374 0f3f749ebe4af6111fe49316639004e4
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz
Size/MD5: 94646 8b6f9380d9f8c5514a1d4db729c6df04
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc
Size/MD5: 1287 f53866efd3ae4f3c939a77b1005e1f11
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz
Size/MD5: 4210843 360a9783dbc853bab6bda90d961daee5
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb
Size/MD5: 484306 f2d03276d1cdcef7e8b276ad8ca9595d
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb
Size/MD5: 901284 6889b371d4de92eb61bf83b89d8a8c37
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 2541692 1e6de4bd3c3baa444a2e1980a593a40e
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 968940 7efe4bdcb99f311f1c4bb2c3b9d24a4e
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 1200930 821861c24499cfdfa2a82c329c610c16
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 996572 00cc1a4c8c7924124984e666563e73d0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 908792 a40763280a3bdbe60eca5e07c5d6c30c
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 2321524 59d44616802197e1227cf88abddefe36
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 967106 a6e5b308d889bdf6f5abe454e35ba474
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 1124462 ec99daa26d0fafba6e9f0b874a23bf3d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 991956 cb20b6a4d68a858ffa0846431169d411
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 907546 1ab5119e23a16e99203c113d49fc2723
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 2305548 da57690a3327196e0c3684735be23f2e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 968984 8da336a5fd871be10e6b8d66d3b9c9d3
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 1074500 e4d6690a6a6a543fc0244a29cd350c9b
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 989566 2d2f4b1662e6a2dffafe8e98f00a15e7
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 907596 4274e006754ebc836132166e0f0429a0
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 2641202 9b2ec56463ee715752b780aa332d8cd0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 985722 a2fca8426b7b51e98c39b91a468bf71f
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 1154496 6073239f7ffead2a5b9c3357ada1602c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 1018596 af12cc55597a0d2d3a92b4b5d683bb14
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 911866 57e2246930e712bdc1b039840d43af48
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 2527568 19b1a0971259a9b99f9c0386f5935bfc
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 970264 d8ae7f0bb10375ad487b14ba031cd013
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 1078842 2401fc4c40352b8c8013e8c5de3b0ecd
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 995228 16b230d3c718d8eb4a023126bd09d7f5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 908708 1e410a8ddac41ad9faec901c5a638f29
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz
Size/MD5: 78642 b4acf50e47be498e579b934f32081d25
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc
Size/MD5: 1447 0abcea5df87851df2aae7ebd1fc00e7a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz
Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb
Size/MD5: 526864 f3a131bf5a4f5c547573430cb66d410c
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb
Size/MD5: 102072 2f276f50efdb7e34f7e61f132f7f7cd7
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 1796950 283c5a95206ab74062e0e30eba4e0890
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 142522 9fff294368a7eac39e37fa478ac6609d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 1296694 d0646a1543c51f14a93b40f972bc1569
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 163178 0378a25e3b2a0bc80ddb8ec720b5557d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 75960 fcba461f2e2376cad515329791e04a17
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 38512 21d9ecbc86a8e5965047d027e94fd324
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 1556806 39e4f63b841c4b36c022017d66c12f58
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 179478 5f08596ae997792920e238ff8cd2a7ba
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 1098794 38bc61a5b403fb4f626a641a5f13e681
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 157954 66e38c37639f3c68e7e4a933fa953ff3
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 74116 50b3a4d0cfd38585d2711d30cf725e9d
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 75038 98cdeec4b1014568b00107a82fc74418
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 1552018 d9dcab084f3b9bf3e8c36cb5db8f141e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 141508 96061180809cccc975e0d7079e07ed3e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 1171530 2d91048fe0a2ac9e3a4fddb84c67513e
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 155564 c67ba3aeb2535ee3e7fc4c89e90ba36a
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 74274 db05202893f516398bbe4e2153ef2d6e
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 35552 a75caf212ffb5a0eafe4ba2656c9aae1
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 1874428 0ed8b5f4e6bad74d506d73447de00bd2
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 158374 dfcd7c4455b4bbd3f746368058d09a59
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 1238226 b5b3a81e956cdb14674d571694d1b6d0
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 185314 5e9d8bd56493f75ae8a8691c530aa420
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 83106 75dea32ec7152b7868fabf09d9d5a198
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 42928 214fe703fced2e387b48b51dcbb1d6b7
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 1760062 ade4c08289d947d092a5b2ab06517cc7
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 143860 62b7260d618531b0ed5e7871ab7b99a9
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 1159702 28ea81660bbdd9d7982be58d225e8814
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 160236 196e493ce73905446a3764e73b99f332
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 75518 f24e4b0e3e4a7d97c28da99cdc0a47a5
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 38240 873f5e820e381ec2254ed520bcd09af0
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz
Size/MD5: 82260 85fb58aa81933f142bd937bca2e18341
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc
Size/MD5: 1956 1ee06f6b731eae435af6a2d438ef909b
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz
Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb
Size/MD5: 527650 9c56f3d70018b714895a61c0daba9498
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb
Size/MD5: 103060 108eb50387ca46b4ee38ebb8722ced88
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 1815638 82385081fe2d4eeb1a6c94f9dae672ad
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 146154 1b6249e02e89213f2f4d2aa9c9123420
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 1315628 8443e091f2c63485a422236ad23e55cd
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 165522 154a05824b98e041ceac60ac83709ef4
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 77914 8d6e328f309e78bf1fcf21c2633d82ec
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 39930 6b7a1a67ca63b5c843ce66f3547b3c89
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 1569568 dd0599b150eccee9889325d17a7b0769
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 184264 52a54aebef81648164a5bc90f27b0cc5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 1119072 10c81fe283b25e7ad31fcfd88a2325f0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 156112 6296f0836bc9797ff48810c79965c3a5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 74476 bd96a6915eb97fed083aac4daa5f07cf
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 77652 3e30e51c362dfa982a3b3197be081328
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 1557614 065f4575c7a2d257fa6b5b9d0cee454f
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 144292 b55f2c4aff8a86499d7f38fd6e773f44
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 1184272 84116fefdce279ce338ffc9614384c06
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 154444 ffe9e765a01695355bdb58008a2910f5
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 73746 762e75672fbd395d2d159513f5d572b0
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 36530 0a98b51b94a5f75d4131d657aa766579
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 1884632 a3ad023841ee605efa1e055712b44d9a
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 161074 5586adea8200d2d5bf81f288b5bf7be2
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 1249636 48ec688499fea1dc0ccb3091c0158fb8
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 181952 8ef5f6b9b6c6b8e4fcd5cb37147304a2
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 81802 965218126fb5a49cfcd9e20afeb49782
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 43048 09f2f9ed9f519ca5723411802e46d48b
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 1759316 46455cc355c1b808243eada0f134d00b
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 145164 2cdb5b35db853c7c184a44022fc23cd8
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 1159834 cfff424e5bff38bb3ef9419f03465388
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 163042 354f7a5423a34c411c5f8620c66d3e58
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 76994 ca11bcf9a411f618e35e1d6b6ab8c8f9
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 38526 172493ec5df1866e2633e074c7f38775
. Summary
Updated ESX packages for OpenSSL, net-snmp, perl.
- Relevant releases
ESX 3.0.2 ESX 3.0.1
Extended Support (Security and Bug fixes) for ESX 3.0.1 has ended on 2008-07-31. Users should plan to upgrade to at least 3.0.2 update 1 and preferably the newest release available.
- Problem Description
I Security Issues
a. OpenSSL Binaries Updated
This fix updates the third party OpenSSL library.
VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows affected, patch pending
hosted * any any for patch info see VMSA-2008-0005
ESXi 3.5 ESXi affected, patch pending
ESX 3.5 ESX for patch info see VMSA-2008-0001 ESX 3.0.3 ESX not affected ESX 3.0.2 ESX affected, patch pending ESX 3.0.1 ESX affected, patch pending ESX 2.5.5 ESX for patch info see VMSA-2008-0001 ESX 2.5.4 ESX for patch info see VMSA-2008-0001
- hosted products are VMware Workstation, Player, ACE, Server, Fusion
II Service Console rpm updates
a. net-snmp Security update
This fix upgrades the service console rpm for net-snmp to version net-snmp-5.0.9-2.30E.24.
VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not applicable
hosted * any any not applicable
ESXi 3.5 ESXi not applicable
ESX 3.5 ESX affected, patch pending ESX 3.0.3 ESX not affected ESX 3.0.2 ESX affected, patch pending ESX 3.0.1 ESX affected, patch pending ESX 2.5.5 ESX not affected ESX 2.5.4 ESX not affected
- hosted products are VMware Workstation, Player, ACE, Server, Fusion
b. perl Security update
This fix upgrades the service console rpm for perl to version perl-5.8.0-98.EL3.
VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not applicable
hosted * any any not applicable
ESXi 3.5 ESXi not applicable
ESX 3.5 ESX affected, patch pending ESX 3.0.3 ESX not affected ESX 3.0.2 ESX affected, patch pending ESX 3.0.1 ESX affected, patch pending ESX 2.5.5 ESX not affected ESX 2.5.4 ESX not affected
-
hosted products are VMware Workstation, Player, ACE, Server, Fusion
-
Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
ESX
ESX 3.0.3 build 104629 ESX Server 3.0.3 CD image md5sum: c2cda9242c6981c7eba1004e8fc5626d Upgrade package from ESX Server 2.x to ESX Server 3.0.3 md5sum: 0ad8fa4707915139d8b2343afebeb92b Upgrade package from earlier releases of ESX Server 3 to ESX Server 3.0.3 md5sum: ff7f3dc12d34b474b231212bdf314113 release notes: http://www.vmware.com/support/vi3/doc/releasenotes_esx303.html
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927
- Change log
2008-08-12 VMSA-2008-0013
Initial release following release of ESX 3.0.3.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. All rights reserved. An attacker could exploit this flaw to spoof an authenticated SNMPv3 packet (CVE-2008-0960).
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292
Updated Packages:
Mandriva Linux 2007.1: 8db66ef5a5468d3fd72a47855230a28e 2007.1/i586/libnet-snmp10-5.3.1-3.2mdv2007.1.i586.rpm c951b17138ef11828b2ccf031d4cddaf 2007.1/i586/libnet-snmp10-devel-5.3.1-3.2mdv2007.1.i586.rpm 536a87919f32fac81964d0a907bf08fe 2007.1/i586/libnet-snmp10-static-devel-5.3.1-3.2mdv2007.1.i586.rpm 39e33947c21666dac5dbe5cfe103b26d 2007.1/i586/net-snmp-5.3.1-3.2mdv2007.1.i586.rpm 1eed5ebaff8f6f83befbf8d831900073 2007.1/i586/net-snmp-mibs-5.3.1-3.2mdv2007.1.i586.rpm 874db03c69584025e4d91049072d3c4e 2007.1/i586/net-snmp-trapd-5.3.1-3.2mdv2007.1.i586.rpm 11af93c879d8cd9353b7cb1826900222 2007.1/i586/net-snmp-utils-5.3.1-3.2mdv2007.1.i586.rpm 2c9e819eeb5fd472f6a0fe338d86182b 2007.1/i586/perl-NetSNMP-5.3.1-3.2mdv2007.1.i586.rpm 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64: aa27de502ce22110fd745c0b847b79d9 2007.1/x86_64/lib64net-snmp10-5.3.1-3.2mdv2007.1.x86_64.rpm 1843dd154c443cca9ae977e502221d6d 2007.1/x86_64/lib64net-snmp10-devel-5.3.1-3.2mdv2007.1.x86_64.rpm 838bd7820d446bd947bc46e090b38066 2007.1/x86_64/lib64net-snmp10-static-devel-5.3.1-3.2mdv2007.1.x86_64.rpm e659d3df04816330c7bf45008f66bc27 2007.1/x86_64/net-snmp-5.3.1-3.2mdv2007.1.x86_64.rpm 756d5606a1039d20a7512b0a109d53bb 2007.1/x86_64/net-snmp-mibs-5.3.1-3.2mdv2007.1.x86_64.rpm 8ad36943e07362865f3a48c99914e48c 2007.1/x86_64/net-snmp-trapd-5.3.1-3.2mdv2007.1.x86_64.rpm 483140c06017507127d12357c3ed2b41 2007.1/x86_64/net-snmp-utils-5.3.1-3.2mdv2007.1.x86_64.rpm e2bb901815ffa1ca5b0a16bc1363f84f 2007.1/x86_64/perl-NetSNMP-5.3.1-3.2mdv2007.1.x86_64.rpm 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm
Mandriva Linux 2008.0: 8de3c4975620db2b2c2697d6f9deb79b 2008.0/i586/libnet-snmp15-5.4.1-1.1mdv2008.0.i586.rpm b1991c58d996f4be200fe141e28c5f7d 2008.0/i586/libnet-snmp-devel-5.4.1-1.1mdv2008.0.i586.rpm 03c54182cc7f97633f29ff0251a8c898 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.1mdv2008.0.i586.rpm 1f792de19b7b38b56d68242958d5d800 2008.0/i586/net-snmp-5.4.1-1.1mdv2008.0.i586.rpm e3362a641e232a6ecf0b8230f0e49ec8 2008.0/i586/net-snmp-mibs-5.4.1-1.1mdv2008.0.i586.rpm bc6d8c10135ea64a4d512d80d04b1b39 2008.0/i586/net-snmp-trapd-5.4.1-1.1mdv2008.0.i586.rpm 8e7f28ee85fb48129eea57d11d391c8b 2008.0/i586/net-snmp-utils-5.4.1-1.1mdv2008.0.i586.rpm beab129e378f61a6bf62d366a4d90639 2008.0/i586/perl-NetSNMP-5.4.1-1.1mdv2008.0.i586.rpm 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 82b570c9cb7e0662df4d7da730c131db 2008.0/x86_64/lib64net-snmp15-5.4.1-1.1mdv2008.0.x86_64.rpm 20b8a6e3fc8dd82fe5ecfdb337553938 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.1mdv2008.0.x86_64.rpm 555688caa0eee850b3a5f835a5778849 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.1mdv2008.0.x86_64.rpm 60d65f80aec29dcb6d4ceb4bb117a9bc 2008.0/x86_64/net-snmp-5.4.1-1.1mdv2008.0.x86_64.rpm 685c9dd25b585afc128de1b3c092e5d5 2008.0/x86_64/net-snmp-mibs-5.4.1-1.1mdv2008.0.x86_64.rpm 7bff860904572c092f737ac17940d5b2 2008.0/x86_64/net-snmp-trapd-5.4.1-1.1mdv2008.0.x86_64.rpm e434686bddfb04f2a8bd01346517ecb4 2008.0/x86_64/net-snmp-utils-5.4.1-1.1mdv2008.0.x86_64.rpm 4fab6e498e1f05809db500ce895aad66 2008.0/x86_64/perl-NetSNMP-5.4.1-1.1mdv2008.0.x86_64.rpm 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.1: 4bafceae1a29f6557b5aa884eca24ba0 2008.1/i586/libnet-snmp15-5.4.1-5.1mdv2008.1.i586.rpm 1eedbae5df7e503de1cba736129beaa1 2008.1/i586/libnet-snmp-devel-5.4.1-5.1mdv2008.1.i586.rpm 615a88847cbf1ce6eaf0029037a14b1b 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.1mdv2008.1.i586.rpm 7323cb7d35eb67664d40ad73b413679d 2008.1/i586/net-snmp-5.4.1-5.1mdv2008.1.i586.rpm d43ed96a806639a94af2a137c75e276e 2008.1/i586/net-snmp-mibs-5.4.1-5.1mdv2008.1.i586.rpm 7394b1361b43056b5eb99827771358cf 2008.1/i586/net-snmp-tkmib-5.4.1-5.1mdv2008.1.i586.rpm 8d6fd9308c2edbe8c020d2c33b3a841d 2008.1/i586/net-snmp-trapd-5.4.1-5.1mdv2008.1.i586.rpm dc58047a02e1a222af20aa794ea8f447 2008.1/i586/net-snmp-utils-5.4.1-5.1mdv2008.1.i586.rpm 2ad9888cd61fc4952c1cee0c48f714b5 2008.1/i586/perl-NetSNMP-5.4.1-5.1mdv2008.1.i586.rpm 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: 618c241e0ecb57685646264c9bb083b4 2008.1/x86_64/lib64net-snmp15-5.4.1-5.1mdv2008.1.x86_64.rpm bb0ebf49ee7cca29965aeb398f4725f6 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.1mdv2008.1.x86_64.rpm b4f29f00773291f6cc00784ed7cde470 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.1mdv2008.1.x86_64.rpm 3039811b6682dc4009b32ff48a99eb2b 2008.1/x86_64/net-snmp-5.4.1-5.1mdv2008.1.x86_64.rpm fab09178635501eb5d6a82eb7bd532a3 2008.1/x86_64/net-snmp-mibs-5.4.1-5.1mdv2008.1.x86_64.rpm da29d4c7edaa15d95f8bee98dbfab025 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.1mdv2008.1.x86_64.rpm d9aad834d82d310c64f6f21e17a55920 2008.1/x86_64/net-snmp-trapd-5.4.1-5.1mdv2008.1.x86_64.rpm 7a7c871bd87dc91c16b046ac115cda70 2008.1/x86_64/net-snmp-utils-5.4.1-5.1mdv2008.1.x86_64.rpm d102ea2af0fcaaebd98defda72bcfc91 2008.1/x86_64/perl-NetSNMP-5.4.1-5.1mdv2008.1.x86_64.rpm 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm
Corporate 3.0: 335af3930865c8eb44ef436cad5fb373 corporate/3.0/i586/libnet-snmp5-5.1-7.4.C30mdk.i586.rpm b8e1d307ee6fa3905d292077fc063318 corporate/3.0/i586/libnet-snmp5-devel-5.1-7.4.C30mdk.i586.rpm a668cc4de411865567d1a93f34cee1e3 corporate/3.0/i586/libnet-snmp5-static-devel-5.1-7.4.C30mdk.i586.rpm d8c0d342b03e5719443d2de06c631bd5 corporate/3.0/i586/libsnmp0-4.2.3-8.2.C30mdk.i586.rpm 6bbe3bb2502ce3c974f7b5737331bb4d corporate/3.0/i586/libsnmp0-devel-4.2.3-8.2.C30mdk.i586.rpm daca10f2e578f75c1e7415d78ed30265 corporate/3.0/i586/net-snmp-5.1-7.4.C30mdk.i586.rpm 1630ebd75201e1bc3956b12a26282f92 corporate/3.0/i586/net-snmp-mibs-5.1-7.4.C30mdk.i586.rpm 5a4f483c877a6278088a265cb3273d61 corporate/3.0/i586/net-snmp-trapd-5.1-7.4.C30mdk.i586.rpm 316d866de7fa7cd984d58f5cb742f5e3 corporate/3.0/i586/net-snmp-utils-5.1-7.4.C30mdk.i586.rpm e3d4197517565f12e2c3a8fd1cc5d2e7 corporate/3.0/i586/ucd-snmp-4.2.3-8.2.C30mdk.i586.rpm 17e8d856fd1dac18552818a842105c88 corporate/3.0/i586/ucd-snmp-utils-4.2.3-8.2.C30mdk.i586.rpm ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm
Corporate 3.0/X86_64: b31f277942fca76d953007c94a60cae2 corporate/3.0/x86_64/lib64net-snmp5-5.1-7.4.C30mdk.x86_64.rpm e4a3fba10ccdd805dc8783ae68c99a42 corporate/3.0/x86_64/lib64net-snmp5-devel-5.1-7.4.C30mdk.x86_64.rpm 530a94cc87af0e4d6e9f3815473c0dd4 corporate/3.0/x86_64/lib64net-snmp5-static-devel-5.1-7.4.C30mdk.x86_64.rpm f246ca421b5d16c599d53f70e4b97660 corporate/3.0/x86_64/lib64snmp0-4.2.3-8.2.C30mdk.x86_64.rpm b943e07726a2fecb016ef4ba626906d8 corporate/3.0/x86_64/lib64snmp0-devel-4.2.3-8.2.C30mdk.x86_64.rpm 22822876f72e35cf6d1ed027df93e74a corporate/3.0/x86_64/net-snmp-5.1-7.4.C30mdk.x86_64.rpm e7e51782b9bbd1e1bdf93c17fb953280 corporate/3.0/x86_64/net-snmp-mibs-5.1-7.4.C30mdk.x86_64.rpm e67a9105f9492c020693d48ce55652ea corporate/3.0/x86_64/net-snmp-trapd-5.1-7.4.C30mdk.x86_64.rpm 171a17e507b2dfdb9c70c0089e582221 corporate/3.0/x86_64/net-snmp-utils-5.1-7.4.C30mdk.x86_64.rpm 96886146d21175b076e92d59e96f5016 corporate/3.0/x86_64/ucd-snmp-4.2.3-8.2.C30mdk.x86_64.rpm 1b6ee4c253f15be516a1928a4f791f15 corporate/3.0/x86_64/ucd-snmp-utils-4.2.3-8.2.C30mdk.x86_64.rpm ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm
Corporate 4.0: 6cbe9d76db3b05c2435bcbc5cf16c898 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.2.20060mlcs4.i586.rpm 586a55cfde45020d5ea0ebf5f2d6c840 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm d992d8300cf0639942a179349d592e15 corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm 03a49b848c376b705dcfcef0ec817daf corporate/4.0/i586/net-snmp-5.2.1.2-5.2.20060mlcs4.i586.rpm 22b9d01b3b7a8a34ed3e1a5a435286a8 corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.i586.rpm dccc01a94c1f29eac2875e6a935bf589 corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.i586.rpm 77f93230f96abce039b52ca5612eaa36 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.i586.rpm 8a7209b70979c9d73035ff40cbd8dbb4 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.i586.rpm ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm
Corporate 4.0/X86_64: f94c7e967973ba8aa12b5605251d6e78 corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.2.20060mlcs4.x86_64.rpm f332985986eff2d6c8a75b5c263dedb1 corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 82fc454916e75866370ee738292021c8 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm ff0adeb23df57eb34869c7100df159da corporate/4.0/x86_64/net-snmp-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 72f2dc9cb1695999660a9ff9c97e4c47 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 0f244551c87e051a8274e5050cf0bc2a corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 7c4e7fb304c77c6551a50495d338e84e corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 68d81ca4c173710ef43b36092df2a6ee corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.x86_64.rpm ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm
Multi Network Firewall 2.0: f98286a301d580fe306917cf0169ef88 mnf/2.0/i586/libnet-snmp5-5.1-7.4.M20mdk.i586.rpm 3ba27516773b1dd933828207cecc7754 mnf/2.0/SRPMS/net-snmp-5.1-7.4.M20mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIW/O7mqjQ0CJFipgRAlNDAJwKuG+ljPAS2MDqj4QOlf+2PtWFUQCeIlun Kcp+qeLAEA/HEE8HXT88NkY= =D9Hu -----END PGP SIGNATURE-----
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "ios xr",
"scope": null,
"trust": 1.1,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "src pe",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "2.0"
},
{
"_id": null,
"model": "src pe",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "1.0"
},
{
"_id": null,
"model": "session and resource control",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "2.0"
},
{
"_id": null,
"model": "session and resource control",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "1.0"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "extreme",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "global associates",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "network appliance",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "snmp research",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "sun microsystems",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ecoscentric",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "netsnmp",
"version": null
},
{
"_id": null,
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.2.4.1"
},
{
"_id": null,
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.3.2.1"
},
{
"_id": null,
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.4.1.1"
},
{
"_id": null,
"model": "mac os x",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "10.5.4"
},
{
"_id": null,
"model": "mac os x server",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "10.5.4"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9424t/sp"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9424t/sp-e"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9424ts/xp-e"
},
{
"_id": null,
"model": "switchblade 5400s series",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"_id": null,
"model": "switchblade 7800r series",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"_id": null,
"model": "switchblade 7800s series",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"_id": null,
"model": "switchblade x908",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"_id": null,
"model": "x900-12xt/s",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"_id": null,
"model": "x900-24xs",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"_id": null,
"model": "x900-24xt",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"_id": null,
"model": "ax2400s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax3600s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax5400s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax6300s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax6700s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax7700r series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax7800r series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "ax7800s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"_id": null,
"model": "seil/neu",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "128 2.00 to 2.42"
},
{
"_id": null,
"model": "seil/plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 1.91"
},
{
"_id": null,
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 1.91"
},
{
"_id": null,
"model": "seil/x1,x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 1.20"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.1"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"_id": null,
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(sparc)"
},
{
"_id": null,
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(x86)"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (sparc)"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (x86)"
},
{
"_id": null,
"model": "catos",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "8.x"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "12.4"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (server)"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3.0"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.0"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.0 (client)"
},
{
"_id": null,
"model": "linux advanced workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1"
},
{
"_id": null,
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (client)"
},
{
"_id": null,
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "r400 series (ax7800r series"
},
{
"_id": null,
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "ax7700r series )"
},
{
"_id": null,
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s2400 series (ax2400s series )"
},
{
"_id": null,
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s3600 series (ax3600s series )"
},
{
"_id": null,
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s400 series (ax7800s series )"
},
{
"_id": null,
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s6300 series (ax6300s series )"
},
{
"_id": null,
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s6700 series (ax6700s series )"
},
{
"_id": null,
"model": "gr4000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"_id": null,
"model": "gs3000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"_id": null,
"model": "gs4000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"_id": null,
"model": "ipcom series",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "10.0"
},
{
"_id": null,
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.3"
},
{
"_id": null,
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.2"
},
{
"_id": null,
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.1"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.58"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.56"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.54"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.52"
},
{
"_id": null,
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.5"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.45"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.43"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.419"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.417"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.416"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.415"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.413"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.410"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.41"
},
{
"_id": null,
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.4"
},
{
"_id": null,
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.5"
},
{
"_id": null,
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.55"
},
{
"_id": null,
"model": "ucd-snmp",
"scope": "eq",
"trust": 0.3,
"vendor": "ucd snmp",
"version": "4.2.6"
},
{
"_id": null,
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"_id": null,
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"_id": null,
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"_id": null,
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"_id": null,
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"_id": null,
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"_id": null,
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"_id": null,
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"_id": null,
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"_id": null,
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "9"
},
{
"_id": null,
"model": "linux enterprise server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise sdk 10.sp1",
"scope": null,
"trust": 0.3,
"vendor": "suse",
"version": null
},
{
"_id": null,
"model": "linux enterprise sdk sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise desktop sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise desktop sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "solaris 10 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "solaris 10 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 01",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.1"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.0"
},
{
"_id": null,
"model": "linux -current",
"scope": null,
"trust": 0.3,
"vendor": "slackware",
"version": null
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "11.0"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.3"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.2"
},
{
"_id": null,
"model": "open-enterprise-server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "0"
},
{
"_id": null,
"model": "novell linux pos",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9"
},
{
"_id": null,
"model": "novell linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"_id": null,
"model": "fedora",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"_id": null,
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"_id": null,
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"_id": null,
"model": "enterprise linux desktop workstation client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"_id": null,
"model": "enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"_id": null,
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"_id": null,
"model": "enterprise linux desktop version",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"_id": null,
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4.0"
},
{
"_id": null,
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3.0"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "6600"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "6400"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "6000"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5700"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5600"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5400"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5300"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5100"
},
{
"_id": null,
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5000"
},
{
"_id": null,
"model": "net-snmp",
"scope": "eq",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.4.1"
},
{
"_id": null,
"model": "net-snmp",
"scope": "eq",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.3.2"
},
{
"_id": null,
"model": "net-snmp",
"scope": "eq",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.2.4"
},
{
"_id": null,
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.1"
},
{
"_id": null,
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.1"
},
{
"_id": null,
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"_id": null,
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"_id": null,
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"_id": null,
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"_id": null,
"model": "multi network firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "2.0"
},
{
"_id": null,
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"_id": null,
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"_id": null,
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"_id": null,
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"_id": null,
"model": "session and resource control appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "2.0"
},
{
"_id": null,
"model": "session and resource control appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "1.0.1"
},
{
"_id": null,
"model": "session and resource control appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "1.0"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.4"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.1"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.5.2"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.5.1"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.4.1"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.4"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.3"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.2"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.1"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.3"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.2"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.1"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.3.1"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.2.1"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.2"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.1"
},
{
"_id": null,
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.4"
},
{
"_id": null,
"model": "firewalll",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.4"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.4"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.1"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.5.2"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.5.1"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.4.1"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.4"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.3"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.2"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.1"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.3"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.2"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.1"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.1.3"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.3.1"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.2.1"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.2"
},
{
"_id": null,
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.1"
},
{
"_id": null,
"model": "openview snmp emanate master agent",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "15"
},
{
"_id": null,
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"_id": null,
"model": "ecos",
"scope": "eq",
"trust": 0.3,
"vendor": "ecoscentric",
"version": "0"
},
{
"_id": null,
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "wireless lan controller module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1"
},
{
"_id": null,
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0"
},
{
"_id": null,
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.1"
},
{
"_id": null,
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0"
},
{
"_id": null,
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.2"
},
{
"_id": null,
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.19"
},
{
"_id": null,
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.18"
},
{
"_id": null,
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.17"
},
{
"_id": null,
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.13"
},
{
"_id": null,
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.9"
},
{
"_id": null,
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.7"
},
{
"_id": null,
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "nx-os",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "mds",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9000"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "catos",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "application control engine module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.5.11"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.5.7"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.3.3"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.7"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.3.9"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.1.7"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.15"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.13.7"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.11.6"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.9"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.17.6"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.5"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.3"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.1"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.11"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.9"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.7"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.1.3"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.1.1"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.3"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.0"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "application \u0026 content networking software",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": "ace xml gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "ace appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"_id": null,
"model": "messaging storage server mm3.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"_id": null,
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"_id": null,
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"_id": null,
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.0"
},
{
"_id": null,
"model": "messaging storage server",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "message networking mn",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"_id": null,
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"_id": null,
"model": "message networking",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "intuity audix r5",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "0"
},
{
"_id": null,
"model": "intuity audix lx",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"_id": null,
"model": "intuity audix",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": "interactive response",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.0"
},
{
"_id": null,
"model": "interactive response",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"_id": null,
"model": "emmc",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.021"
},
{
"_id": null,
"model": "emmc",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.017"
},
{
"_id": null,
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"_id": null,
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"_id": null,
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"_id": null,
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.0"
},
{
"_id": null,
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1.1"
},
{
"_id": null,
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"_id": null,
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1.5"
},
{
"_id": null,
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"_id": null,
"model": "esx server patch",
"scope": "ne",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.510"
},
{
"_id": null,
"model": "net-snmp",
"scope": "ne",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.4.1.1"
},
{
"_id": null,
"model": "net-snmp",
"scope": "ne",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.3.2.1"
},
{
"_id": null,
"model": "net-snmp",
"scope": "ne",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.2.4.1"
},
{
"_id": null,
"model": "siparator",
"scope": "ne",
"trust": 0.3,
"vendor": "ingate",
"version": "4.7.1"
},
{
"_id": null,
"model": "firewall",
"scope": "ne",
"trust": 0.3,
"vendor": "ingate",
"version": "4.7.1"
},
{
"_id": null,
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"_id": null,
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:net-snmp:net-snmp",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:centrecom",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_5400s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_7800r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_7800s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_x908",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:x900-12xts",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:x900-24xs",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:x900-24xt",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax2400s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax3600s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax5400s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax6300s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax6700s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7700r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7800r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7800s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:sun:opensolaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:sun:solaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:catos",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:ios",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:ios_xr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:nec:ip8800_s_r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gr4000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gs3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gs4000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:ipcom",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
}
]
},
"credits": {
"_id": null,
"data": "Wes Hardaker",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
}
],
"trust": 0.6
},
"cve": "CVE-2008-0960",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2008-0960",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-31085",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2008-0960",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#878044",
"trust": 0.8,
"value": "7.56"
},
{
"author": "NVD",
"id": "CVE-2008-0960",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200806-140",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-31085",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2008-0960",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"description": {
"_id": null,
"data": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. SNMPv3 The implementation of contains an authentication bypass vulnerability because it does not properly handle crafted packets. SNMP (Simple Network Management Protocol) Is a widely used protocol for monitoring and managing network devices. SNMPv3 Supports security features such as authentication and privacy control. SNMPv3 In the authentication of HMAC (keyed-Hash Message Authentication Code) Is used. This code is generated by combining a private key and a cryptographic hash function. SNMPv3 Depending on the implementation of, there is a possibility that authentication may be bypassed by processing specially crafted packets due to vulnerability in authentication processing.By remote third party SNMP The object may be read or modified. Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error. \nSuccessfully exploiting this issue will allow attackers to gain unauthorized access to the affected application. \nNet-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. An attacker could exploit this vulnerability to read and modify any SNMP object accessible using the authenticated credentials logged into the system. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nCisco Security Advisory: SNMP Version 3 Authentication\nVulnerabilities\n\nDocument ID: 107408\n\nAdvisory ID: cisco-sa-20080610-snmpv3\n\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\n\nRevision 1.0\n\nFor Public Release 2008 June 10 1600 UTC (GMT)\n\n- ---------------------------------------------------------------------\n\nSummary\n=======\n\nMultiple Cisco products contain either of two authentication\nvulnerabilities in the Simple Network Management Protocol version 3\n(SNMPv3) feature. These vulnerabilities can be exploited when\nprocessing a malformed SNMPv3 message. These vulnerabilities could\nallow the disclosure of network information or may enable an attacker\nto perform configuration changes to vulnerable devices. The SNMP\nserver is an optional service that is disabled by default in Cisco\nproducts. Only SNMPv3 is impacted by these vulnerabilities. \nWorkarounds are available for mitigating the impact of the\nvulnerabilities described in this document. \n\nThe United States Computer Emergency Response Team (US-CERT) has\nassigned Vulnerability Note VU#878044 to these vulnerabilities. \n\nCommon Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960\nhas also been assigned to these vulnerabilities. \n\nThis advisory is posted at\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\n\nAffected Products\n=================\n\nVulnerable Products\n+------------------\n\nThe following Cisco products are vulnerable. \n\n * Cisco IOS\n * Cisco IOS-XR\n * Cisco Catalyst Operating System (CatOS)\n * Cisco NX-OS\n * Cisco Application Control Engine (ACE) Module\n * Cisco ACE Appliance\n * Cisco ACE XML Gateway\n * Cisco MDS 9000 Series Multilayer Fabric Switches\n\nNote: The SNMP server is disabled by default. These vulnerabilities\nonly impact devices that are configured for SNMPv3. \n\nTo determine the version of SNMP configured in Cisco IOS, CatOS and\nIOS-XR, log in to the device and issue the show snmp group command. \nThe security model field indicates the version of SNMP configured. \nThe output \"usm\" is the abbreviation for user-based security model\nand this indicates SNMPv3 is configured. \n\n Cisco IOS\n router#show snmp group\n groupname: test security model:v3 noauth \n readview : v1default writeview: \u003cno writeview specified\u003e \n notifyview: \u003cno notifyview specified\u003e \n row status: active\n \n Cisco CatOS\n 5500-1 (enable) show snmp group\n Security Model: v3\n Security Name: userv3\n Group Name: groupv3\n Storage Type: nonvolatile\n Row Status: active\n \n Cisco IOS-XR\n RP/0/RP0/CPU0:ios#show snmp group\n groupname: test security model:usm\n readview : v1default writeview: -\n notifyview: v1default\n row status: nonVolatile \n \n\nIronPort\n+-------\n\nIronPort C-Series, X-Series, and M-Series appliances utilize code\ncovered by this advisory, but are not susceptible to any security\nrisk. IronPort C-Series, X-Series, and M-Series incorporate the\nlibraries under the advisory to provide anonymous read-only access to\nsystem health data. There is no risk of escalated authorization\nprivileges allowing a 3rd party to make any configuration changes to\nthe IronPort devices. IronPort S-Series and Encryption Appliances are\nnot affected by this advisory. This announcement has also been posted\non the IronPort Support Portal, available to IronPort customers: \n\nhttps://supportportal.ironport.com/irppcnctr/srvcd?u=http://secure-support.soma.ironport.com/announcement\u0026sid=900016 \n\nProducts Confirmed Not Vulnerable\n+--------------------------------\n\nThe following Cisco products are confirmed not vulnerable:\n\n * Cisco PIX Security Appliances\n * Cisco ASA Security Appliances\n * Cisco Firewall Services Module (FWSM)\n * Cisco Security Monitoring, Analysis, and Response System (MARS)\n * Cisco Network Admission Control (NAC) Appliance\n * CiscoWorks Wireless LAN Solution Engine (WLSE)\n\nNo other Cisco products are currently known to be affected by these\nvulnerabilities. \n\nThere are three general types of SNMP operations: \"get\" requests to\nrequest information, \"set\" requests that modify the configuration of\na remote device, and \"trap\" messages that provide a monitoring\nfunction. SNMP requests and traps are transported over User Datagram\nProtocol (UDP) and are received at the assigned destination port\nnumbers 161 and 162, respectively. \n\nSNMPv3 provides secure access to devices by authenticating and\nencrypting packets over the network. RFC2574 defines\nthe use of HMAC-MD5-96 and HMAC-SHA-96 as the possible authentication\nprotocols for SNMPv3. This advisory identifies two\nvulnerabilities that are almost identical. Both are specifically\nrelated to malformed SNMPv3 packets that manipulate the Hash Message\nAuthentication Code (HMAC). The two vulnerabilities may impact both\nSecure Hashing Algorithm-1 (SHA-1) and Message-Digest Algorithm 5\n(MD5). The vulnerabilities described in this document can be\nsuccessfully exploited using spoofed SNMPv3 packets. \n\nThese vulnerabilities are documented in the following Cisco Bug IDs:\n\n * CSCsf04754 - IOS SNMPv3 HMAC Authentication issue \n * CSCsf30109 - IOS-XR SNMPv3 HMAC Authentication issue \n * CSCsf29976 - CatOS SNMPv3 HMAC Authentication issue \n * CSCsq62662 - ACE XML Gw SNMPv3 HMAC Authentication issue\n * CSCsq60664 - ACE Appliance SNMPv3 HMAC Authentication issue\n * CSCsq60695 - ACE Module SNMPv3 HMAC Authentication issue\n * CSCsq60582 - Nexus SNMPv3 HMAC Authentication issue\n\nNote: Although multiple software defects are listed, this advisory\nonly identifies two vulnerabilities. Because different Cisco products\nrequire their own fixes, additional Bug IDs have been assigned. \n\nVulnerability Scoring Details\n=============================\n\nCisco has provided scores for the vulnerabilities in this advisory\nbased on the Common Vulnerability Scoring System (CVSS). The CVSS\nscoring in this Security Advisory is done in accordance with CVSS\nversion 2.0. \n\nCVSS is a standards-based scoring method that conveys vulnerability\nseverity and helps determine urgency and priority of response. \n\nCisco has provided a base and temporal score. Customers can then\ncompute environmental scores to assist in determining the impact of\nthe vulnerability in individual networks. \n\nCisco has provided an FAQ to answer additional questions regarding\nCVSS at\n\nhttp://www.cisco.com/web/about/security/intelligence/cvss-qandas.html\n\nCisco has also provided a CVSS calculator to help compute the\nenvironmental impact for individual networks at\n\nhttp://intellishield.cisco.com/security/alertmanager/cvss\n\nCSCsf04754 - IOS SNMPv3 HMAC Authentication issue\n- -----------------------------------------------------\n\nCVSS Base Score - 10\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Low\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.3\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Official-Fix\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsf30109 - IOS-XR SNMPv3 HMAC Authentication issue\n- --------------------------------------------------------\n\nCVSS Base Score - 10\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Low\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.3\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Official-Fix\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsf29976 - CatOS SNMPv3 HMAC Authentication issue\n- -------------------------------------------------------\n\nCVSS Base Score - 10\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Low\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.3\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Official-Fix\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsq62662 - ACE XML Gw SNMPv3 HMAC Authentication issue\n- ------------------------------------------------------------\n\nCVSS Base Score - 9.3\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Medium\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 7.7\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Official-Fix\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsq60664 - ACE Appliance SNMPv3 HMAC Authentication issue\n- ---------------------------------------------------------------\n\nCVSS Base Score - 9.3\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Medium\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.4\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Workaround\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsq60695 - ACE Module SNMPv3 HMAC Authentication issue\n- ------------------------------------------------------------\n\nCVSS Base Score - 9.3\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Medium\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.4\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Workaround\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsq60582 - Nexus SNMPv3 HMAC Authentication issue\n- -------------------------------------------------------\n\nCVSS Base Score - 9.3\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Medium\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.4\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Workaround\n\tReport Confidence\t - Confirmed\n\n\nImpact\n======\n\nSuccessful exploitation of these vulnerabilities could result in the\ndisclosure of sensitive information on a device or allow an attacker\nto make configuration changes to a vulnerable device that is based on\nthe SNMP configuration. \n\nSoftware Versions and Fixes\n===========================\n\nWhen considering software upgrades, also consult\nhttp://www.cisco.com/go/psirt and any subsequent advisories to\ndetermine exposure and a complete upgrade solution. \n\nIn all cases, customers should exercise caution to be certain the\ndevices to be upgraded contain sufficient memory and that current\nhardware and software configurations will continue to be supported\nproperly by the new release. If the information is not clear, contact\nthe Cisco Technical Assistance Center (TAC) or your contracted\nmaintenance provider for assistance. \n\nEach row of the Cisco IOS software table (below) names a Cisco IOS\nrelease train. If a given release train is vulnerable, then the\nearliest possible releases that contain the fix (along with the\nanticipated date of availability for each, if applicable) are listed\nin the \"First Fixed Release\" column of the table. The \"Recommended\nRelease\" column indicates the releases which have fixes for all the\npublished vulnerabilities at the time of this Advisory. A device\nrunning a release in the given train that is earlier than the release\nin a specific column (less than the First Fixed Release) is known to\nbe vulnerable. Cisco recommends upgrading to a release equal to or\nlater than the release in the \"Recommended Releases\" column of the\ntable. \n\n+---------------------------------------+\n| Affected | Affected | First |\n| Product | Release | Fixed |\n| | | Release |\n|-----------------+----------+----------|\n| | 6.x | 6.4(23) |\n| |----------+----------|\n| Cisco Catalyst | 7.x | 7.6(19) |\n|Operating |----------+----------|\n| System (CatOS) | 8.5.x | 8.5(7) |\n| |----------+----------|\n| | 8.6.x | 8.6(1) |\n+---------------------------------------+\n\nCisco IOS XR\n+-----------\n\nThe following table lists fixed Cisco IOS XR software. \n\n+---------------------------------------------------+\n| Cisco | | |\n| IOS XR | SMU ID | SMU Name |\n| Version | | |\n|---------+------------+----------------------------|\n| 3.2.2 | AA01681 | hfr-base-3.2.2.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.2.3 | AA01682 | hfr-base-3.2.3.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.2.4 | AA01683 | hfr-base-3.2.4.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.2.6 | AA01684 | hfr-base-3.2.6.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.0 | AA01685 | hfr-base-3.3.0.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.0 | AA01690 | c12k-base-3.3.0.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.1 | AA01686 | hfr-base-3.3.1.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.1 | AA01688 | c12k-base-3.3.1.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.2 | Not | Not vulnerable |\n| | vulnerable | |\n|---------+------------+----------------------------|\n| 3.4.x | Not | Not vulnerable |\n| | vulnerable | |\n+---------------------------------------------------+\n\nCisco NX-OS\n+----------\n\nThe following table lists fixed Cisco NX-OS software. \n\n+----------------------------------------+\n| Affected | Affected | First Fixed |\n| Product | Release | Release |\n|-----------+-----------+----------------|\n| Cisco | | 4.0.(2) |\n| NX-OS | 4.0.(1)a | Available June |\n| | | 2008 |\n+----------------------------------------+\n\nCisco ACE Products\n+-----------------\n\nThe following table lists fixed Cisco Application Control Engine\n(ACE) software. \n\n+---------------------------------------+\n| Affected | Affected | First |\n| Product | Release | Fixed |\n| | | Release |\n|----------------+----------+-----------|\n| | 3.0(0)A1 | |\n| Cisco | (6.x) | |\n| Application | | A2(1.1) |\n| Control Engine | A2(1.0) | |\n| (ACE) Module | | |\n| | A2(1.0a) | |\n|----------------+----------+-----------|\n| | A1(7.0) | |\n| | | |\n| Cisco | A1(7.0a) | |\n| Application | | |\n| Control Engine | A1(7.0b) | A1(8.0a) |\n| (ACE) | | |\n| Appliance | A1(7.0c) | |\n| | | |\n| | A1(8.0) | |\n|----------------+----------+-----------|\n| Cisco | 4.x | |\n| Application | | 6.0.1 |\n| Control Engine | 5.x | Available |\n| (ACE) XML | | June 2008 |\n| Gateway | 6.0 | |\n+---------------------------------------+\n\nCisco MDS software\n+-----------------\n\nThe following table lists fixed Cisco MDS Multilayer Switch software. \n\n+---------------------------------------+\n| Affected | Affected | First Fixed |\n| Product | Release | Release |\n|-----------+-----------+---------------|\n| | 2.1 | |\n| Cisco MDS | | 3.4.1 |\n| 9000 | 3.0 | Available |\n| | | June 2008 |\n| | 3.2 | |\n+---------------------------------------+\n\nWorkarounds\n===========\n\nThe following workarounds have been identified for these\nvulnerabilities. \n\nInfrastructure Access Control Lists\n+----------------------------------\n\nAlthough it is often difficult to block traffic that transits a\nnetwork, it is possible to identify traffic that should never be\nallowed to target infrastructure devices and block that traffic at\nthe border of networks. Infrastructure Access Control Lists (iACLs)\nare a network security best practice and should be considered as a\nlong-term addition to good network security as well as a workaround\nfor these specific vulnerabilities. The iACL example below should be\nincluded as part of the deployed infrastructure access-list which\nwill protect all devices with IP addresses in the infrastructure IP\naddress range:\n\nNote: UDP port 161 is applicable for all versions of SNMP. \n\n \n !--- Permit SNMP UDP 161 packets from\n !--- trusted hosts destined to infrastructure addresses. \n \n access-list 150 permit udp TRUSTED_HOSTS MASK INFRASTRUCTURE_ADDRESSES MASK eq 161\n \n !--- Deny SNMP UDP 161 packets from all\n !--- other sources destined to infrastructure addresses. \n \n access-list 150 deny udp any INFRASTRUCTURE_ADDRESSES MASK eq 161\n \n !--- Permit/deny all other Layer 3 and Layer 4 traffic in accordance\n !--- with existing security policies and configurations\n !--- Permit all other traffic to transit the device. \n \n access-list 150 permit ip any anyinterface serial 2/0ip access-group 150 in\n \n\nThe white paper entitled \"Protecting Your Core: Infrastructure\nProtection Access Control Lists\" presents guidelines and recommended\ndeployment techniques for infrastructure protection access lists. \nThis white paper can be obtained at the following link:\nhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801a1a55.shtml\n\nControl Plane Policing\n+---------------------\n\nControl Plane Policing (CoPP) can be used to block untrusted SNMP\naccess to the device. Cisco IOS software releases 12.0S, 12.2SX,\n12.2S, 12.3T, 12.4, and 12.4T support the CoPP feature. CoPP can be\nconfigured on a device to protect the management and control planes\nand minimize the risk and effectiveness of direct infrastructure\nattacks by explicitly permitting only authorized traffic that is sent\nto infrastructure devices in accordance with existing security\npolicies and configurations. The following example, which uses\n192.168.100.1 to represent a trusted host, can be adapted to your\nnetwork. \n\n \n !--- Deny SNMP UDP traffic from trusted hosts to all IP addresses\n !--- configured on all interfaces of the affected device so that\n \n !--- it will be allowed by the CoPP feature\n \n \n access-list 111 deny udp host 192.168.100.1 any eq 161\n \n \n !--- Permit all other SNMP UDP traffic sent to all IP addresses\n !--- configured on all interfaces of the affected device so that it\n !--- will be policed and dropped by the CoPP feature\n \n \n access-list 111 permit udp any any eq 161\n \n \n !--- Permit (Police or Drop)/Deny (Allow) all other Layer3 and Layer4\n !--- traffic in accordance with existing security policies and\n !--- configurations for traffic that is authorized to be sent\n !--- to infrastructure devices\n \n !--- Create a Class-Map for traffic to be policed by\n !--- the CoPP feature\n \n \n class-map match-all drop-snmpv3-class\n match access-group 111\n \n \n !--- Create a Policy-Map that will be applied to the\n !--- Control-Plane of the device. \n \n \n policy-map drop-snmpv3-traffic\n class drop-snmpv3-class\n drop\n \n \n !--- Apply the Policy-Map to the \n !--- Control-Plane of the device\n \n \n control-plane\n service-policy input drop-snmpv3-traffic\n \n\nIn the above CoPP example, the access control list entries (ACEs)\nthat match the potential exploit packets with the \"permit\" action\nresult in these packets being discarded by the policy-map \"drop\"\nfunction, while packets that match the \"deny\" action (not shown) are\nnot affected by the policy-map drop function. \n\nPlease note that the policy-map syntax is different in the 12.2S and\n12.0S Cisco IOS trains:\n\n policy-map drop-snmpv3-traffic\n class drop-snmpv3-class\n police 32000 1500 1500 conform-action drop exceed-action drop\n \n\nAdditional information on the configuration and use of the CoPP\nfeature is available at the following links:\n\nhttp://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6642/prod_white_paper0900aecd804fa16a.html\n\nand \n\nhttp://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gtrtlimt.html\n\nTransit Access Control Lists\n+---------------------------\n\nFilters that deny SNMP packets using UDP port 161 should be deployed\nthroughout the network as part of a Transit Access Control List\n(tACL) policy for protection of traffic that enters the network at\ningress access points. This policy should be configured to protect\nthe network device where the filter is applied and other devices\nbehind it. Filters for SNMP packets that use UDP port 161 should also\nbe deployed in front of vulnerable network devices so that traffic is\nonly allowed from trusted clients. \n\nAdditional information about tACLs is available in \"Transit Access\nControl Lists: Filtering at Your Edge:\"\n\nhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801afc76.shtml\n\nHardening Guide Statement\n+------------------------\n\nCustomers are advised to review the \"Fortifying the Simple Network\nManagement Protocol\" section of the \"Cisco Guide to Harden Cisco IOS\nDevices\" for information on configuring an IOS device for SNMPv3\nauthentication and privacy:\n\nhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml#fortify\n\nCisco IOS authPriv Configuration\n+-------------------------------\n\nEnabling the SNMPv3 privacy subsystem (if it is not already in use)\nis a short-term workaround for users who are unable to upgrade in a\ntimely fashion. This subsystem is used to encrypt SNMPv3 traffic\nusing a shared secret. \n\nIn Cisco IOS, administrators can enable this workaround by using the \nauthPriv SNMPv3 feature. Only Cisco IOS crypto images can run the \nauthPriv feature. \n\nNote: Ensure that the management application supports SNMPv3 \nauthPriv before implementing this feature. \n\nApplied Mitigation Bulletin\n+--------------------------\n\nAdditional mitigation techniques that can be deployed on Cisco devices\nwithin the network are available in the Cisco Applied Intelligence\ncompanion document for this advisory:\nhttp://www.cisco.com/warp/public/707/cisco-amb-20080610-SNMPv3.shtml\n\nObtaining Fixed Software\n========================\n\nCisco has released free software updates that address these\nvulnerabilities. Prior to deploying software, customers should\nconsult their maintenance provider or check the software for feature\nset compatibility and known issues specific to their environment. \n\nCustomers may only install and expect support for the feature sets\nthey have purchased. By installing, downloading, accessing or\notherwise using such software upgrades, customers agree to be bound by\nthe terms of Cisco\u0027s software license terms found at\nhttp://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html\nor as otherwise set forth at Cisco.com Downloads at\nhttp://www.cisco.com/public/sw-center/sw-usingswc.shtml. \n\nDo not contact psirt@cisco.com or security-alert@cisco.com for\nsoftware upgrades. \n\nCustomers with Service Contracts\n+-------------------------------\n\nCustomers with contracts should obtain upgraded software through\ntheir regular update channels. For most customers, this means that\nupgrades should be obtained through the Software Center on Cisco\u0027s\nworldwide website at http://www.cisco.com. \n\nCustomers using Third Party Support Organizations\n+------------------------------------------------\n\nCustomers whose Cisco products are provided or maintained through\nprior or existing agreements with third-party support organizations,\nsuch as Cisco Partners, authorized resellers, or service providers\nshould contact that support organization for guidance and assistance\nwith the appropriate course of action in regards to this advisory. \n\nThe effectiveness of any workaround or fix is dependent on specific\ncustomer situations, such as product mix, network topology, traffic\nbehavior, and organizational mission. Due to the variety of affected\nproducts and releases, customers should consult with their service\nprovider or support organization to ensure any applied workaround or\nfix is the most appropriate for use in the intended network before it\nis deployed. \n\nCustomers without Service Contracts\n+----------------------------------\n\nCustomers who purchase direct from Cisco but do not hold a Cisco\nservice contract, and customers who purchase through third-party\nvendors but are unsuccessful in obtaining fixed software through\ntheir point of sale should acquire upgrades by contacting the Cisco\nTechnical Assistance Center (TAC). TAC contacts are as follows. \n\n * +1 800 553 2447 (toll free from within North America)\n * +1 408 526 7209 (toll call from anywhere in the world)\n * e-mail: tac@cisco.com\n\nCustomers should have their product serial number available and be\nprepared to give the URL of this notice as evidence of entitlement to\na free upgrade. Free upgrades for non-contract customers must be\nrequested through the TAC. \n\nRefer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml\nfor additional TAC contact information, including localized telephone\nnumbers, and instructions and e-mail addresses for use in various\nlanguages. \n\nExploitation and Public Announcements\n=====================================\n\nCisco is releasing this combined Cisco IOS and non-IOS product\nadvisory out of our normal bi-yearly IOS security advisory cycle due\nto public disclosure of these vulnerabilities. \n\nCisco is not aware of any malicious exploitation of these\nvulnerabilities. \n\nThese vulnerabilities were reported to Cisco by Dr. Tom Dunigan of\nthe University of Tennessee and Net-SNMP in cooperation with the CERT\nCoordination Center. \n\nStatus of this Notice: FINAL\n============================\n\nTHIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY\nKIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF\nMERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE\nINFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS\nAT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS\nDOCUMENT AT ANY TIME. \n\nA stand-alone copy or Paraphrase of the text of this document that\nomits the distribution URL in the following section is an\nuncontrolled copy, and may lack important information or contain\nfactual errors. \n\nDistribution\n============\n\nThis advisory is posted on Cisco\u0027s worldwide website at :\n\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\n\nIn addition to worldwide web posting, a text version of this notice\nis clear-signed with the Cisco PSIRT PGP key and is posted to the\nfollowing e-mail and Usenet news recipients. \n\n * cust-security-announce@cisco.com\n * first-teams@first.org\n * bugtraq@securityfocus.com\n * vulnwatch@vulnwatch.org\n * cisco@spot.colorado.edu\n * cisco-nsp@puck.nether.net\n * full-disclosure@lists.grok.org.uk\n * comp.dcom.sys.cisco@newsgate.cisco.com\n\nFuture updates of this advisory, if any, will be placed on Cisco\u0027s\nworldwide website, but may or may not be actively announced on\nmailing lists or newsgroups. Users concerned about this problem are\nencouraged to check the above URL for any updates. \n\nRevision History\n================\n\n+---------------------------------------+\n| Revision | | Initial |\n| 1.0 | 2008-June-10 | public |\n| | | release |\n+---------------------------------------+\n\nCisco Security Procedures\n=========================\n\nComplete information on reporting security vulnerabilities in Cisco\nproducts, obtaining assistance with security incidents, and\nregistering to receive security information from Cisco, is available\non Cisco\u0027s worldwide website at\nhttp://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. \nThis includes instructions for press inquiries regarding Cisco\nsecurity notices. All Cisco security advisories are available at\nhttp://www.cisco.com/go/psirt. \n\n- ---------------------------------------------------------------------\n\nUpdated: Jun 10, 2008 Document ID: 107408\n\n- ---------------------------------------------------------------------\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (Darwin)\n\niD8DBQFITruJ86n/Gc8U/uARAiuNAJwIq42/p8CUh7Dc88nAn9a1pfhhqgCfWXjv\n8bYhCD0EKNQ28koObq4S+vQ=\n=zOBL\n-----END PGP SIGNATURE-----\n. \n\nThe authentication code reads the length to be checked from sender input,\nthis allows the sender to supply single byte HMAC code and have a 1 in 256\nchance of matching the correct HMAC and authenticating, as only the first\nbyte will be checked. The sender would need to know a valid username. \n\nCurrently Net-SNMP and UCD-SNMP are known to be vulnerable, other SNMP\nimplementations may also be affected. The eCos project includes code derived\nfrom UCD-SNMP and is therefore also affected. \n\nAffected version:\n\nNet-SNMP \u003c= 5.4.1, \u003c= 5.3.2, \u003c= 5.2.4\nUCD-SNMP, all versions\neCos, all versions\n\nFixed version:\n\nNet-SNMP \u003e= 5.4.1.1, \u003e= 5.3.2.1, \u003e= 5.2.4.1\nUCD-SNMP, N/A\neCos, N/A\n\nCredit: this issue was reported by CERT/CC, it is tracked as VU#878044. \n\nCVE: CVE-2008-0960\n\nTimeline:\n2008-06-05: CERT/CC reports VU#878044 to oCERT requesting joint coordination\n2008-06-05: contacted affected vendors\n2008-06-06: added eCos to affected packages\n2008-06-09: patched net-snmp packages released\n2008-06-09: advisory release\n\nReferences:\nhttp://sourceforge.net/forum/forum.php?forum_id=833770\nhttp://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380\nhttp://www.kb.cert.org/vuls/id/878044\n\nLinks:\nhttp://www.net-snmp.org\nhttp://www.ece.ucdavis.edu/ucd-snmp\nhttp://ecos.sourceware.org\n\nPermalink:\nhttp://www.ocert.org/advisories/ocert-2008-006.html\n\n-- \nAndrea Barisani | Founder \u0026 Project Coordinator\n oCERT | Open Source Computer Emergency Response Team\n\n\u003clcars@ocert.org\u003e http://www.ocert.org\n 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E\n \"Pluralitas non est ponenda sine necessitate\"\n. ===========================================================\nUbuntu Security Notice USN-685-1 December 03, 2008\nnet-snmp vulnerabilities\nCVE-2008-0960, CVE-2008-2292, CVE-2008-4309\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 7.10\nUbuntu 8.04 LTS\nUbuntu 8.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n libsnmp-perl 5.2.1.2-4ubuntu2.3\n libsnmp9 5.2.1.2-4ubuntu2.3\n\nUbuntu 7.10:\n libsnmp-perl 5.3.1-6ubuntu2.2\n libsnmp10 5.3.1-6ubuntu2.2\n\nUbuntu 8.04 LTS:\n libsnmp-perl 5.4.1~dfsg-4ubuntu4.2\n libsnmp15 5.4.1~dfsg-4ubuntu4.2\n\nUbuntu 8.10:\n libsnmp15 5.4.1~dfsg-7.1ubuntu6.1\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nWes Hardaker discovered that the SNMP service did not correctly validate\nHMAC authentication requests. An unauthenticated remote attacker\ncould send specially crafted SNMPv3 traffic with a valid username\nand gain access to the user\u0027s views without a valid authentication\npassphrase. (CVE-2008-0960)\n\nJohn Kortink discovered that the Net-SNMP Perl module did not correctly\ncheck the size of returned values. If a user or automated system were\ntricked into querying a malicious SNMP server, the application using\nthe Perl module could be made to crash, leading to a denial of service. \nThis did not affect Ubuntu 8.10. (CVE-2008-2292)\n\nIt was discovered that the SNMP service did not correctly handle large\nGETBULK requests. If an unauthenticated remote attacker sent a specially\ncrafted request, the SNMP service could be made to crash, leading to a\ndenial of service. (CVE-2008-4309)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz\n Size/MD5: 75402 9655d984a47cec8e27efa4db0b227870\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc\n Size/MD5: 838 17a17230a005c1acfd0569757e728fad\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz\n Size/MD5: 3869893 34159770a7fe418d99fdd416a75358b1\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb\n Size/MD5: 1152306 f7647cee4df8db87ab48c0d05635a973\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb\n Size/MD5: 822946 b9b852c188937d1fffc06d4da01325d5\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 896620 a78012b3f0f13667081f97dc1a4d62e8\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 1497194 7d55b8d1e4ae0c45753bedcf536a1a5a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 1826252 0550c1401f9bbe5f345fd96484ed369c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 889330 5ad0ddb2c610973166e4dd07769ba3d3\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 797086 18cf4210342b683d3ee24fe995329b55\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 896880 298d27ea1ece6e80bb8931b9a5e61961\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 1268472 acbca43ab7ea747fa3e4636d15ef997c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 1710342 bd27290685bcf1d6a23eb8705d3367e7\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 881838 58121bd9e4c845da7df4e540645e0e13\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 794672 221d1c554bd89f50dc3ac9108a6cef6b\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 913064 45a033b01c4b31ef90a92988bb5fb229\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 1590124 b62aa5477d9307d311c811298b7ec3d9\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 1728094 5214ce9aebe3a8d7a28a1746a81ce8ea\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 898580 86e6c1b5dfb5bf91f63d7c6786b7abae\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 796092 1bab28407224f782b2c3ae04b4647333\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 896832 3d233db9682d5654fdad6bc6b5a649ba\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 1485268 064304ead0ca4653136376e8e9039e74\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 1706490 cb76027eb8167e0866a81b93a4da28ed\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 883182 d1ffc12427d92be51efdba3349e74f9a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 796374 0f3f749ebe4af6111fe49316639004e4\n\nUpdated packages for Ubuntu 7.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz\n Size/MD5: 94646 8b6f9380d9f8c5514a1d4db729c6df04\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc\n Size/MD5: 1287 f53866efd3ae4f3c939a77b1005e1f11\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz\n Size/MD5: 4210843 360a9783dbc853bab6bda90d961daee5\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb\n Size/MD5: 484306 f2d03276d1cdcef7e8b276ad8ca9595d\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb\n Size/MD5: 901284 6889b371d4de92eb61bf83b89d8a8c37\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 2541692 1e6de4bd3c3baa444a2e1980a593a40e\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 968940 7efe4bdcb99f311f1c4bb2c3b9d24a4e\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 1200930 821861c24499cfdfa2a82c329c610c16\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 996572 00cc1a4c8c7924124984e666563e73d0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 908792 a40763280a3bdbe60eca5e07c5d6c30c\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 2321524 59d44616802197e1227cf88abddefe36\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 967106 a6e5b308d889bdf6f5abe454e35ba474\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 1124462 ec99daa26d0fafba6e9f0b874a23bf3d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 991956 cb20b6a4d68a858ffa0846431169d411\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 907546 1ab5119e23a16e99203c113d49fc2723\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 2305548 da57690a3327196e0c3684735be23f2e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 968984 8da336a5fd871be10e6b8d66d3b9c9d3\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 1074500 e4d6690a6a6a543fc0244a29cd350c9b\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 989566 2d2f4b1662e6a2dffafe8e98f00a15e7\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 907596 4274e006754ebc836132166e0f0429a0\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 2641202 9b2ec56463ee715752b780aa332d8cd0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 985722 a2fca8426b7b51e98c39b91a468bf71f\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 1154496 6073239f7ffead2a5b9c3357ada1602c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 1018596 af12cc55597a0d2d3a92b4b5d683bb14\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 911866 57e2246930e712bdc1b039840d43af48\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 2527568 19b1a0971259a9b99f9c0386f5935bfc\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 970264 d8ae7f0bb10375ad487b14ba031cd013\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 1078842 2401fc4c40352b8c8013e8c5de3b0ecd\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 995228 16b230d3c718d8eb4a023126bd09d7f5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 908708 1e410a8ddac41ad9faec901c5a638f29\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz\n Size/MD5: 78642 b4acf50e47be498e579b934f32081d25\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc\n Size/MD5: 1447 0abcea5df87851df2aae7ebd1fc00e7a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz\n Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb\n Size/MD5: 526864 f3a131bf5a4f5c547573430cb66d410c\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb\n Size/MD5: 102072 2f276f50efdb7e34f7e61f132f7f7cd7\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 1796950 283c5a95206ab74062e0e30eba4e0890\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 142522 9fff294368a7eac39e37fa478ac6609d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 1296694 d0646a1543c51f14a93b40f972bc1569\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 163178 0378a25e3b2a0bc80ddb8ec720b5557d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 75960 fcba461f2e2376cad515329791e04a17\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 38512 21d9ecbc86a8e5965047d027e94fd324\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 1556806 39e4f63b841c4b36c022017d66c12f58\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 179478 5f08596ae997792920e238ff8cd2a7ba\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 1098794 38bc61a5b403fb4f626a641a5f13e681\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 157954 66e38c37639f3c68e7e4a933fa953ff3\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 74116 50b3a4d0cfd38585d2711d30cf725e9d\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 75038 98cdeec4b1014568b00107a82fc74418\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 1552018 d9dcab084f3b9bf3e8c36cb5db8f141e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 141508 96061180809cccc975e0d7079e07ed3e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 1171530 2d91048fe0a2ac9e3a4fddb84c67513e\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 155564 c67ba3aeb2535ee3e7fc4c89e90ba36a\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 74274 db05202893f516398bbe4e2153ef2d6e\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 35552 a75caf212ffb5a0eafe4ba2656c9aae1\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 1874428 0ed8b5f4e6bad74d506d73447de00bd2\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 158374 dfcd7c4455b4bbd3f746368058d09a59\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 1238226 b5b3a81e956cdb14674d571694d1b6d0\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 185314 5e9d8bd56493f75ae8a8691c530aa420\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 83106 75dea32ec7152b7868fabf09d9d5a198\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 42928 214fe703fced2e387b48b51dcbb1d6b7\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 1760062 ade4c08289d947d092a5b2ab06517cc7\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 143860 62b7260d618531b0ed5e7871ab7b99a9\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 1159702 28ea81660bbdd9d7982be58d225e8814\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 160236 196e493ce73905446a3764e73b99f332\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 75518 f24e4b0e3e4a7d97c28da99cdc0a47a5\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 38240 873f5e820e381ec2254ed520bcd09af0\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz\n Size/MD5: 82260 85fb58aa81933f142bd937bca2e18341\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc\n Size/MD5: 1956 1ee06f6b731eae435af6a2d438ef909b\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz\n Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb\n Size/MD5: 527650 9c56f3d70018b714895a61c0daba9498\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb\n Size/MD5: 103060 108eb50387ca46b4ee38ebb8722ced88\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 1815638 82385081fe2d4eeb1a6c94f9dae672ad\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 146154 1b6249e02e89213f2f4d2aa9c9123420\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 1315628 8443e091f2c63485a422236ad23e55cd\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 165522 154a05824b98e041ceac60ac83709ef4\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 77914 8d6e328f309e78bf1fcf21c2633d82ec\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 39930 6b7a1a67ca63b5c843ce66f3547b3c89\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 1569568 dd0599b150eccee9889325d17a7b0769\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 184264 52a54aebef81648164a5bc90f27b0cc5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 1119072 10c81fe283b25e7ad31fcfd88a2325f0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 156112 6296f0836bc9797ff48810c79965c3a5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 74476 bd96a6915eb97fed083aac4daa5f07cf\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 77652 3e30e51c362dfa982a3b3197be081328\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 1557614 065f4575c7a2d257fa6b5b9d0cee454f\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 144292 b55f2c4aff8a86499d7f38fd6e773f44\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 1184272 84116fefdce279ce338ffc9614384c06\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 154444 ffe9e765a01695355bdb58008a2910f5\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 73746 762e75672fbd395d2d159513f5d572b0\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 36530 0a98b51b94a5f75d4131d657aa766579\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 1884632 a3ad023841ee605efa1e055712b44d9a\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 161074 5586adea8200d2d5bf81f288b5bf7be2\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 1249636 48ec688499fea1dc0ccb3091c0158fb8\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 181952 8ef5f6b9b6c6b8e4fcd5cb37147304a2\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 81802 965218126fb5a49cfcd9e20afeb49782\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 43048 09f2f9ed9f519ca5723411802e46d48b\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 1759316 46455cc355c1b808243eada0f134d00b\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 145164 2cdb5b35db853c7c184a44022fc23cd8\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 1159834 cfff424e5bff38bb3ef9419f03465388\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 163042 354f7a5423a34c411c5f8620c66d3e58\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 76994 ca11bcf9a411f618e35e1d6b6ab8c8f9\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 38526 172493ec5df1866e2633e074c7f38775\n\n. Summary\n\n Updated ESX packages for OpenSSL, net-snmp, perl. \n\n2. Relevant releases\n \n ESX 3.0.2\n ESX 3.0.1\n\n Extended Support (Security and Bug fixes) for ESX 3.0.1 has ended on\n 2008-07-31. Users should plan to upgrade to at least 3.0.2 update 1\n and preferably the newest release available. \n\n3. Problem Description\n\n I Security Issues\n\n a. OpenSSL Binaries Updated\n\n This fix updates the third party OpenSSL library. \n \n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows affected, patch pending\n\n hosted * any any for patch info see VMSA-2008-0005\n \n ESXi 3.5 ESXi affected, patch pending\n\n ESX 3.5 ESX for patch info see VMSA-2008-0001\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX affected, patch pending\n ESX 3.0.1 ESX affected, patch pending\n ESX 2.5.5 ESX for patch info see VMSA-2008-0001\n ESX 2.5.4 ESX for patch info see VMSA-2008-0001\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n \n II Service Console rpm updates\n\n a. net-snmp Security update\n \n This fix upgrades the service console rpm for net-snmp to version\n net-snmp-5.0.9-2.30E.24. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not applicable\n\n hosted * any any not applicable\n \n ESXi 3.5 ESXi not applicable\n\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX affected, patch pending\n ESX 3.0.1 ESX affected, patch pending\n ESX 2.5.5 ESX not affected\n ESX 2.5.4 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n\n b. perl Security update\n \n This fix upgrades the service console rpm for perl to version\n perl-5.8.0-98.EL3. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not applicable\n\n hosted * any any not applicable\n \n ESXi 3.5 ESXi not applicable\n\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX affected, patch pending\n ESX 3.0.1 ESX affected, patch pending\n ESX 2.5.5 ESX not affected\n ESX 2.5.4 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n ESX\n ---\n ESX 3.0.3 build 104629\n ESX Server 3.0.3 CD image\n md5sum: c2cda9242c6981c7eba1004e8fc5626d\n Upgrade package from ESX Server 2.x to ESX Server 3.0.3\n md5sum: 0ad8fa4707915139d8b2343afebeb92b\n Upgrade package from earlier releases of ESX Server 3 to ESX Server\n3.0.3\n md5sum: ff7f3dc12d34b474b231212bdf314113\n release notes:\n http://www.vmware.com/support/vi3/doc/releasenotes_esx303.html\n \n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2008-08-12 VMSA-2008-0013 \nInitial release following release of ESX 3.0.3. \n\n- ------------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2008 VMware Inc. All rights reserved. An attacker\n could exploit this flaw to spoof an authenticated SNMPv3 packet\n (CVE-2008-0960). \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 8db66ef5a5468d3fd72a47855230a28e 2007.1/i586/libnet-snmp10-5.3.1-3.2mdv2007.1.i586.rpm\n c951b17138ef11828b2ccf031d4cddaf 2007.1/i586/libnet-snmp10-devel-5.3.1-3.2mdv2007.1.i586.rpm\n 536a87919f32fac81964d0a907bf08fe 2007.1/i586/libnet-snmp10-static-devel-5.3.1-3.2mdv2007.1.i586.rpm\n 39e33947c21666dac5dbe5cfe103b26d 2007.1/i586/net-snmp-5.3.1-3.2mdv2007.1.i586.rpm\n 1eed5ebaff8f6f83befbf8d831900073 2007.1/i586/net-snmp-mibs-5.3.1-3.2mdv2007.1.i586.rpm\n 874db03c69584025e4d91049072d3c4e 2007.1/i586/net-snmp-trapd-5.3.1-3.2mdv2007.1.i586.rpm\n 11af93c879d8cd9353b7cb1826900222 2007.1/i586/net-snmp-utils-5.3.1-3.2mdv2007.1.i586.rpm\n 2c9e819eeb5fd472f6a0fe338d86182b 2007.1/i586/perl-NetSNMP-5.3.1-3.2mdv2007.1.i586.rpm \n 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n aa27de502ce22110fd745c0b847b79d9 2007.1/x86_64/lib64net-snmp10-5.3.1-3.2mdv2007.1.x86_64.rpm\n 1843dd154c443cca9ae977e502221d6d 2007.1/x86_64/lib64net-snmp10-devel-5.3.1-3.2mdv2007.1.x86_64.rpm\n 838bd7820d446bd947bc46e090b38066 2007.1/x86_64/lib64net-snmp10-static-devel-5.3.1-3.2mdv2007.1.x86_64.rpm\n e659d3df04816330c7bf45008f66bc27 2007.1/x86_64/net-snmp-5.3.1-3.2mdv2007.1.x86_64.rpm\n 756d5606a1039d20a7512b0a109d53bb 2007.1/x86_64/net-snmp-mibs-5.3.1-3.2mdv2007.1.x86_64.rpm\n 8ad36943e07362865f3a48c99914e48c 2007.1/x86_64/net-snmp-trapd-5.3.1-3.2mdv2007.1.x86_64.rpm\n 483140c06017507127d12357c3ed2b41 2007.1/x86_64/net-snmp-utils-5.3.1-3.2mdv2007.1.x86_64.rpm\n e2bb901815ffa1ca5b0a16bc1363f84f 2007.1/x86_64/perl-NetSNMP-5.3.1-3.2mdv2007.1.x86_64.rpm \n 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 8de3c4975620db2b2c2697d6f9deb79b 2008.0/i586/libnet-snmp15-5.4.1-1.1mdv2008.0.i586.rpm\n b1991c58d996f4be200fe141e28c5f7d 2008.0/i586/libnet-snmp-devel-5.4.1-1.1mdv2008.0.i586.rpm\n 03c54182cc7f97633f29ff0251a8c898 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.1mdv2008.0.i586.rpm\n 1f792de19b7b38b56d68242958d5d800 2008.0/i586/net-snmp-5.4.1-1.1mdv2008.0.i586.rpm\n e3362a641e232a6ecf0b8230f0e49ec8 2008.0/i586/net-snmp-mibs-5.4.1-1.1mdv2008.0.i586.rpm\n bc6d8c10135ea64a4d512d80d04b1b39 2008.0/i586/net-snmp-trapd-5.4.1-1.1mdv2008.0.i586.rpm\n 8e7f28ee85fb48129eea57d11d391c8b 2008.0/i586/net-snmp-utils-5.4.1-1.1mdv2008.0.i586.rpm\n beab129e378f61a6bf62d366a4d90639 2008.0/i586/perl-NetSNMP-5.4.1-1.1mdv2008.0.i586.rpm \n 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 82b570c9cb7e0662df4d7da730c131db 2008.0/x86_64/lib64net-snmp15-5.4.1-1.1mdv2008.0.x86_64.rpm\n 20b8a6e3fc8dd82fe5ecfdb337553938 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.1mdv2008.0.x86_64.rpm\n 555688caa0eee850b3a5f835a5778849 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.1mdv2008.0.x86_64.rpm\n 60d65f80aec29dcb6d4ceb4bb117a9bc 2008.0/x86_64/net-snmp-5.4.1-1.1mdv2008.0.x86_64.rpm\n 685c9dd25b585afc128de1b3c092e5d5 2008.0/x86_64/net-snmp-mibs-5.4.1-1.1mdv2008.0.x86_64.rpm\n 7bff860904572c092f737ac17940d5b2 2008.0/x86_64/net-snmp-trapd-5.4.1-1.1mdv2008.0.x86_64.rpm\n e434686bddfb04f2a8bd01346517ecb4 2008.0/x86_64/net-snmp-utils-5.4.1-1.1mdv2008.0.x86_64.rpm\n 4fab6e498e1f05809db500ce895aad66 2008.0/x86_64/perl-NetSNMP-5.4.1-1.1mdv2008.0.x86_64.rpm \n 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.1:\n 4bafceae1a29f6557b5aa884eca24ba0 2008.1/i586/libnet-snmp15-5.4.1-5.1mdv2008.1.i586.rpm\n 1eedbae5df7e503de1cba736129beaa1 2008.1/i586/libnet-snmp-devel-5.4.1-5.1mdv2008.1.i586.rpm\n 615a88847cbf1ce6eaf0029037a14b1b 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.1mdv2008.1.i586.rpm\n 7323cb7d35eb67664d40ad73b413679d 2008.1/i586/net-snmp-5.4.1-5.1mdv2008.1.i586.rpm\n d43ed96a806639a94af2a137c75e276e 2008.1/i586/net-snmp-mibs-5.4.1-5.1mdv2008.1.i586.rpm\n 7394b1361b43056b5eb99827771358cf 2008.1/i586/net-snmp-tkmib-5.4.1-5.1mdv2008.1.i586.rpm\n 8d6fd9308c2edbe8c020d2c33b3a841d 2008.1/i586/net-snmp-trapd-5.4.1-5.1mdv2008.1.i586.rpm\n dc58047a02e1a222af20aa794ea8f447 2008.1/i586/net-snmp-utils-5.4.1-5.1mdv2008.1.i586.rpm\n 2ad9888cd61fc4952c1cee0c48f714b5 2008.1/i586/perl-NetSNMP-5.4.1-5.1mdv2008.1.i586.rpm \n 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n 618c241e0ecb57685646264c9bb083b4 2008.1/x86_64/lib64net-snmp15-5.4.1-5.1mdv2008.1.x86_64.rpm\n bb0ebf49ee7cca29965aeb398f4725f6 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.1mdv2008.1.x86_64.rpm\n b4f29f00773291f6cc00784ed7cde470 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.1mdv2008.1.x86_64.rpm\n 3039811b6682dc4009b32ff48a99eb2b 2008.1/x86_64/net-snmp-5.4.1-5.1mdv2008.1.x86_64.rpm\n fab09178635501eb5d6a82eb7bd532a3 2008.1/x86_64/net-snmp-mibs-5.4.1-5.1mdv2008.1.x86_64.rpm\n da29d4c7edaa15d95f8bee98dbfab025 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.1mdv2008.1.x86_64.rpm\n d9aad834d82d310c64f6f21e17a55920 2008.1/x86_64/net-snmp-trapd-5.4.1-5.1mdv2008.1.x86_64.rpm\n 7a7c871bd87dc91c16b046ac115cda70 2008.1/x86_64/net-snmp-utils-5.4.1-5.1mdv2008.1.x86_64.rpm\n d102ea2af0fcaaebd98defda72bcfc91 2008.1/x86_64/perl-NetSNMP-5.4.1-5.1mdv2008.1.x86_64.rpm \n 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm\n\n Corporate 3.0:\n 335af3930865c8eb44ef436cad5fb373 corporate/3.0/i586/libnet-snmp5-5.1-7.4.C30mdk.i586.rpm\n b8e1d307ee6fa3905d292077fc063318 corporate/3.0/i586/libnet-snmp5-devel-5.1-7.4.C30mdk.i586.rpm\n a668cc4de411865567d1a93f34cee1e3 corporate/3.0/i586/libnet-snmp5-static-devel-5.1-7.4.C30mdk.i586.rpm\n d8c0d342b03e5719443d2de06c631bd5 corporate/3.0/i586/libsnmp0-4.2.3-8.2.C30mdk.i586.rpm\n 6bbe3bb2502ce3c974f7b5737331bb4d corporate/3.0/i586/libsnmp0-devel-4.2.3-8.2.C30mdk.i586.rpm\n daca10f2e578f75c1e7415d78ed30265 corporate/3.0/i586/net-snmp-5.1-7.4.C30mdk.i586.rpm\n 1630ebd75201e1bc3956b12a26282f92 corporate/3.0/i586/net-snmp-mibs-5.1-7.4.C30mdk.i586.rpm\n 5a4f483c877a6278088a265cb3273d61 corporate/3.0/i586/net-snmp-trapd-5.1-7.4.C30mdk.i586.rpm\n 316d866de7fa7cd984d58f5cb742f5e3 corporate/3.0/i586/net-snmp-utils-5.1-7.4.C30mdk.i586.rpm\n e3d4197517565f12e2c3a8fd1cc5d2e7 corporate/3.0/i586/ucd-snmp-4.2.3-8.2.C30mdk.i586.rpm\n 17e8d856fd1dac18552818a842105c88 corporate/3.0/i586/ucd-snmp-utils-4.2.3-8.2.C30mdk.i586.rpm \n ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm\n 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n b31f277942fca76d953007c94a60cae2 corporate/3.0/x86_64/lib64net-snmp5-5.1-7.4.C30mdk.x86_64.rpm\n e4a3fba10ccdd805dc8783ae68c99a42 corporate/3.0/x86_64/lib64net-snmp5-devel-5.1-7.4.C30mdk.x86_64.rpm\n 530a94cc87af0e4d6e9f3815473c0dd4 corporate/3.0/x86_64/lib64net-snmp5-static-devel-5.1-7.4.C30mdk.x86_64.rpm\n f246ca421b5d16c599d53f70e4b97660 corporate/3.0/x86_64/lib64snmp0-4.2.3-8.2.C30mdk.x86_64.rpm\n b943e07726a2fecb016ef4ba626906d8 corporate/3.0/x86_64/lib64snmp0-devel-4.2.3-8.2.C30mdk.x86_64.rpm\n 22822876f72e35cf6d1ed027df93e74a corporate/3.0/x86_64/net-snmp-5.1-7.4.C30mdk.x86_64.rpm\n e7e51782b9bbd1e1bdf93c17fb953280 corporate/3.0/x86_64/net-snmp-mibs-5.1-7.4.C30mdk.x86_64.rpm\n e67a9105f9492c020693d48ce55652ea corporate/3.0/x86_64/net-snmp-trapd-5.1-7.4.C30mdk.x86_64.rpm\n 171a17e507b2dfdb9c70c0089e582221 corporate/3.0/x86_64/net-snmp-utils-5.1-7.4.C30mdk.x86_64.rpm\n 96886146d21175b076e92d59e96f5016 corporate/3.0/x86_64/ucd-snmp-4.2.3-8.2.C30mdk.x86_64.rpm\n 1b6ee4c253f15be516a1928a4f791f15 corporate/3.0/x86_64/ucd-snmp-utils-4.2.3-8.2.C30mdk.x86_64.rpm \n ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm\n 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm\n\n Corporate 4.0:\n 6cbe9d76db3b05c2435bcbc5cf16c898 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 586a55cfde45020d5ea0ebf5f2d6c840 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm\n d992d8300cf0639942a179349d592e15 corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 03a49b848c376b705dcfcef0ec817daf corporate/4.0/i586/net-snmp-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 22b9d01b3b7a8a34ed3e1a5a435286a8 corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.i586.rpm\n dccc01a94c1f29eac2875e6a935bf589 corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 77f93230f96abce039b52ca5612eaa36 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 8a7209b70979c9d73035ff40cbd8dbb4 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.i586.rpm \n ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n f94c7e967973ba8aa12b5605251d6e78 corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n f332985986eff2d6c8a75b5c263dedb1 corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 82fc454916e75866370ee738292021c8 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n ff0adeb23df57eb34869c7100df159da corporate/4.0/x86_64/net-snmp-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 72f2dc9cb1695999660a9ff9c97e4c47 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 0f244551c87e051a8274e5050cf0bc2a corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 7c4e7fb304c77c6551a50495d338e84e corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 68d81ca4c173710ef43b36092df2a6ee corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.x86_64.rpm \n ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm\n\n Multi Network Firewall 2.0:\n f98286a301d580fe306917cf0169ef88 mnf/2.0/i586/libnet-snmp5-5.1-7.4.M20mdk.i586.rpm \n 3ba27516773b1dd933828207cecc7754 mnf/2.0/SRPMS/net-snmp-5.1-7.4.M20mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFIW/O7mqjQ0CJFipgRAlNDAJwKuG+ljPAS2MDqj4QOlf+2PtWFUQCeIlun\nKcp+qeLAEA/HEE8HXT88NkY=\n=D9Hu\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-0960"
},
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "PACKETSTORM",
"id": "67160"
},
{
"db": "PACKETSTORM",
"id": "67140"
},
{
"db": "PACKETSTORM",
"id": "72606"
},
{
"db": "PACKETSTORM",
"id": "69029"
},
{
"db": "PACKETSTORM",
"id": "67532"
}
],
"trust": 3.24
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-31085",
"trust": 0.1,
"type": "unknown"
},
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=5790",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#878044",
"trust": 3.8
},
{
"db": "NVD",
"id": "CVE-2008-0960",
"trust": 3.4
},
{
"db": "OCERT",
"id": "OCERT-2008-006",
"trust": 3.0
},
{
"db": "BID",
"id": "29623",
"trust": 2.9
},
{
"db": "SECUNIA",
"id": "30574",
"trust": 2.8
},
{
"db": "USCERT",
"id": "TA08-162A",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "30665",
"trust": 2.0
},
{
"db": "VUPEN",
"id": "ADV-2008-2971",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1788",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1787",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1836",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1800",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2009-1612",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1797",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1801",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1981",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2361",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "5790",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "32664",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "35463",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "33003",
"trust": 1.8
},
{
"db": "SREASON",
"id": "3933",
"trust": 1.8
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2008/06/09/1",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020218",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "30802",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30626",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "31334",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30612",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30615",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "31568",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "31351",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30648",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "31467",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30647",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30596",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431",
"trust": 0.8
},
{
"db": "BUGTRAQ",
"id": "20081031 VMSA-2008-0017 UPDATED ESX PACKAGES FOR LIBXML2, UCD-SNMP, LIBTIFF",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20080609 [OCERT-2008-006] MULTIPLE SNMP IMPLEMENTATIONS HMAC AUTHENTICATION SPOOFING",
"trust": 0.6
},
{
"db": "REDHAT",
"id": "RHSA-2008:0529",
"trust": 0.6
},
{
"db": "MANDRIVA",
"id": "MDVSA-2008:118",
"trust": 0.6
},
{
"db": "MILW0RM",
"id": "5790",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2008-5218",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2008-5215",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2008-5224",
"trust": 0.6
},
{
"db": "SUNALERT",
"id": "238865",
"trust": 0.6
},
{
"db": "MLIST",
"id": "[OSS-SECURITY] 20080609 [OCERT-2008-006] MULTIPLE SNMP IMPLEMENTATIONS HMAC AUTHENTICATION SPOOFING",
"trust": 0.6
},
{
"db": "CERT/CC",
"id": "TA08-162A",
"trust": 0.6
},
{
"db": "UBUNTU",
"id": "USN-685-1",
"trust": 0.6
},
{
"db": "DEBIAN",
"id": "DSA-1663",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20080610 SNMP VERSION 3 AUTHENTICATION VULNERABILITIES",
"trust": 0.6
},
{
"db": "GENTOO",
"id": "GLSA-200808-02",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "67160",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "67532",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "72606",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "67140",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68741",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68866",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "67231",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "71748",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-31085",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2008-0960",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "69029",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "PACKETSTORM",
"id": "67160"
},
{
"db": "PACKETSTORM",
"id": "67140"
},
{
"db": "PACKETSTORM",
"id": "72606"
},
{
"db": "PACKETSTORM",
"id": "69029"
},
{
"db": "PACKETSTORM",
"id": "67532"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"id": "VAR-200806-0575",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-31085"
}
],
"trust": 0.61355825
},
"last_update_date": "2026-03-09T20:26:07.255000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Security Update 2008-004",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT2163"
},
{
"title": "net-snmp-5.3.1-19.1.1AXS3",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=146"
},
{
"title": "cisco-sa-20080610-snmpv3",
"trust": 0.8,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"title": "1291",
"trust": 0.8,
"url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=1291"
},
{
"title": "1328",
"trust": 0.8,
"url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=1328"
},
{
"title": "NV08-007",
"trust": 0.8,
"url": "http://www.nec.co.jp/security-info/secinfo/nv08-007.html"
},
{
"title": "Fixes VU#878044 and CVE-2008-0960",
"trust": 0.8,
"url": "https://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"title": "RHSA-2008:0528",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"title": "RHSA-2008:0529",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2008-0529.html"
},
{
"title": "Net-SNMP SNMPv3 USM \u8a8d\u8a3c\u51e6\u7406\u306e\u8106\u5f31\u6027",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2008/06111446.php"
},
{
"title": "238865",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1"
},
{
"title": "snmp_12",
"trust": 0.8,
"url": "http://fenics.fujitsu.com/products/support/2008/snmp_12.html"
},
{
"title": "SNMPv3\u306b\u95a2\u3059\u308b\u8a8d\u8a3c\u56de\u907f\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://www.allied-telesis.co.jp/support/list/faq/vuls/20080924.html"
},
{
"title": "AX-VU2008-02",
"trust": 0.8,
"url": "http://www.alaxala.com/jp/support/security/20080630.html"
},
{
"title": "RHSA-2008:0528",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0528J.html"
},
{
"title": "RHSA-2008:0529",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0529J.html"
},
{
"title": "YSAR-15-0002: Vnet/IP\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u30a4\u30c3\u30c1\u306bSNMPv3\u8a8d\u8a3c\u8fc2\u56de\u306e\u8106\u5f31\u6027",
"trust": 0.8,
"url": "http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm"
},
{
"title": "SNMPv3",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/network/notice/SNMPv3.html"
},
{
"title": "TA08-162A",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-162a.html"
},
{
"title": "Debian CVElist Bug Report Logs: net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a8541a6f686f7cf0c507fc152f31fed3"
},
{
"title": "Cisco: SNMP Version 3 Authentication Vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20080610-snmpv3"
},
{
"title": "Ubuntu Security Notice: net-snmp vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-685-1"
},
{
"title": "Debian Security Advisories: DSA-1663-1 net-snmp -- several vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=61d231c8116737565b9155223d52d04c"
},
{
"title": "VMware Security Advisories: Updated ESX packages for libxml2, ucd-snmp, libtiff",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=4b3f89e87c3a2b8f6ca491f31d73afa9"
},
{
"title": "VMware Security Advisories: Updated ESX packages for OpenSSL, net-snmp, perl",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=66428db28c8b0a38eb32535e5949367a"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 3.1,
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"trust": 3.0,
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"trust": 2.7,
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"trust": 2.6,
"url": "http://www.securityfocus.com/bid/29623"
},
{
"trust": 2.6,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-162a.html"
},
{
"trust": 2.2,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"trust": 2.1,
"url": "http://support.apple.com/kb/ht2163"
},
{
"trust": 2.1,
"url": "http://support.avaya.com/elmodocs2/security/asa-2008-282.htm"
},
{
"trust": 2.1,
"url": "http://www.kb.cert.org/vuls/id/mimg-7ets5z"
},
{
"trust": 2.1,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"trust": 1.8,
"url": "http://www.kb.cert.org/vuls/id/ctar-7fbs8q"
},
{
"trust": 1.8,
"url": "http://www.kb.cert.org/vuls/id/mimg-7ets87"
},
{
"trust": 1.8,
"url": "http://www.vmware.com/security/advisories/vmsa-2008-0013.html"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"trust": 1.8,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00363.html"
},
{
"trust": 1.8,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00459.html"
},
{
"trust": 1.8,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00380.html"
},
{
"trust": 1.8,
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"trust": 1.8,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:118"
},
{
"trust": 1.8,
"url": "http://www.vmware.com/security/advisories/vmsa-2008-0017.html"
},
{
"trust": 1.8,
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"trust": 1.8,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0529.html"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020218"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/32664"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/33003"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/35463"
},
{
"trust": 1.8,
"url": "http://securityreason.com/securityalert/3933"
},
{
"trust": 1.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"trust": 1.8,
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"trust": 1.8,
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/30574/"
},
{
"trust": 1.5,
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"trust": 1.5,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0528.html"
},
{
"trust": 1.2,
"url": "http://lists.apple.com/archives/security-announce/2008//jun/msg00002.html"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"trust": 1.2,
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"trust": 1.2,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10820"
},
{
"trust": 1.2,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5785"
},
{
"trust": 1.2,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6414"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30574"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30596"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30612"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30615"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30626"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30647"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30648"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30665"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30802"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/31334"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/31351"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/31467"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/31568"
},
{
"trust": 1.2,
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"trust": 1.1,
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"trust": 1.0,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0960"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/30665/"
},
{
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1 "
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu878044/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta08-162a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta08-162a/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0960"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/497962/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/493218/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.milw0rm.com/exploits/5790"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2971"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2361"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1981/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1836/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1801/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1800/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1797/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1788/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1787/references"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0960"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a00809adfc8.html"
},
{
"trust": 0.3,
"url": "http://www.net-snmp.org/"
},
{
"trust": 0.3,
"url": "http://www.ingate.com/relnote.php?ver=471"
},
{
"trust": 0.3,
"url": "/archive/1/493218"
},
{
"trust": 0.3,
"url": "/archive/1/493238"
},
{
"trust": 0.3,
"url": "/archive/1/493304"
},
{
"trust": 0.3,
"url": "/archive/1/495389"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/elmodocs2/security/asa-2008-252.htm"
},
{
"trust": 0.3,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026id=766427"
},
{
"trust": 0.3,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026documentoid=905600\u0026poid="
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0529.html"
},
{
"trust": 0.3,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2292"
},
{
"trust": 0.2,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2292"
},
{
"trust": 0.1,
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026amp;aid=1989089\u0026amp;group_id=12694\u0026amp;atid=456380"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=127730470825399\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/287.html"
},
{
"trust": 0.1,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485945"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20080610-snmpv3"
},
{
"trust": 0.1,
"url": "https://www.exploit-db.com/exploits/5790/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/685-1/"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/prod_warranties_item09186a008088e31f.html"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml#fortify"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/prod/collateral/iosswrel/ps6537/ps6586/ps6642/prod_white_paper0900aecd804fa16a.html"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/docs/ios/12_3t/12_3t4/feature/guide/gtrtlimt.html"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html"
},
{
"trust": 0.1,
"url": "https://supportportal.ironport.com/irppcnctr/srvcd?u=http://secure-support.soma.ironport.com/announcement\u0026sid=900016"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/707/cisco-amb-20080610-snmpv3.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/tech/tk648/tk361/technologies_white_paper09186a00801a1a55.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/tech/tk648/tk361/technologies_white_paper09186a00801afc76.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/687/directory/dirtac.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/public/sw-center/sw-usingswc.shtml."
},
{
"trust": 0.1,
"url": "http://intellishield.cisco.com/security/alertmanager/cvss"
},
{
"trust": 0.1,
"url": "http://ecos.sourceware.org"
},
{
"trust": 0.1,
"url": "http://www.ece.ucdavis.edu/ucd-snmp"
},
{
"trust": 0.1,
"url": "http://www.net-snmp.org"
},
{
"trust": 0.1,
"url": "http://www.ocert.org"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4309"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/vi3/doc/releasenotes_esx303.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5135"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/security"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1927"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1927"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/security_response.html"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1055"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5135"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3108"
},
{
"trust": 0.1,
"url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-3108"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos_vi.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos.html"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/advisories"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "PACKETSTORM",
"id": "67160"
},
{
"db": "PACKETSTORM",
"id": "67140"
},
{
"db": "PACKETSTORM",
"id": "72606"
},
{
"db": "PACKETSTORM",
"id": "69029"
},
{
"db": "PACKETSTORM",
"id": "67532"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#878044",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-31085",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2008-0960",
"ident": null
},
{
"db": "BID",
"id": "29623",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "67160",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "67140",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "72606",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "69029",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "67532",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2008-0960",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2008-06-10T00:00:00",
"db": "CERT/CC",
"id": "VU#878044",
"ident": null
},
{
"date": "2008-06-10T00:00:00",
"db": "VULHUB",
"id": "VHN-31085",
"ident": null
},
{
"date": "2008-06-10T00:00:00",
"db": "VULMON",
"id": "CVE-2008-0960",
"ident": null
},
{
"date": "2008-06-10T00:00:00",
"db": "BID",
"id": "29623",
"ident": null
},
{
"date": "2008-06-11T00:59:03",
"db": "PACKETSTORM",
"id": "67160",
"ident": null
},
{
"date": "2008-06-11T00:30:32",
"db": "PACKETSTORM",
"id": "67140",
"ident": null
},
{
"date": "2008-12-04T02:50:13",
"db": "PACKETSTORM",
"id": "72606",
"ident": null
},
{
"date": "2008-08-13T04:58:12",
"db": "PACKETSTORM",
"id": "69029",
"ident": null
},
{
"date": "2008-06-21T01:10:58",
"db": "PACKETSTORM",
"id": "67532",
"ident": null
},
{
"date": "2008-06-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200806-140",
"ident": null
},
{
"date": "2008-07-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001431",
"ident": null
},
{
"date": "2008-06-10T18:32:00",
"db": "NVD",
"id": "CVE-2008-0960",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2009-07-16T00:00:00",
"db": "CERT/CC",
"id": "VU#878044",
"ident": null
},
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-31085",
"ident": null
},
{
"date": "2018-10-30T00:00:00",
"db": "VULMON",
"id": "CVE-2008-0960",
"ident": null
},
{
"date": "2015-04-13T22:21:00",
"db": "BID",
"id": "29623",
"ident": null
},
{
"date": "2011-07-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200806-140",
"ident": null
},
{
"date": "2016-11-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001431",
"ident": null
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2008-0960",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "72606"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
}
],
"trust": 0.7
},
"title": {
"_id": null,
"data": "SNMPv3 improper HMAC validation allows authentication bypass",
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
}
],
"trust": 0.6
}
}
VAR-200707-0675
Vulnerability from variot - Updated: 2026-03-09 20:23The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug.". ISC BIND version 8 generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. plural DNS There is a vulnerability in the implementation that makes cache poisoning attacks easier. Recent research has found a more efficient method of cash poisoning than previously known. DNS As a cache server, PC Please note that there is a possibility of attack. Cash poisoning attack forged response This is done by sending a packet. query The source port of the packet query By changing the value randomly every time, the probability of a successful cache poisoning attack can be reduced.By cash poisoning attack DNS Fake cache server DNS Information can be cached and DNS Nodes using the cache server may be directed to fake sites. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. And spoof the address returned by the DNS response. =========================================================== Ubuntu Security Notice USN-627-1 July 22, 2008 dnsmasq vulnerability CVE-2008-1447 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 8.04 LTS: dnsmasq-base 2.41-2ubuntu2.1
After a standard system upgrade you need to restart Dnsmasq to effect the necessary changes.
Details follow:
Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Dnsmasq.
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz
Size/MD5: 22023 89c0f060733a11e414ef1fa634b17149
http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc
Size/MD5: 698 e44ebdb66be7abcaba3f1558b9379abb
http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz
Size/MD5: 357997 8d0acd6656299a800c4d1be5a1193e39
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb
Size/MD5: 11962 fbe42757babf0522e92a48438cdf7d0b
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb
Size/MD5: 210032 015334862975edd0c6157624b9b4cd6b
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb
Size/MD5: 202466 87bebd172bae955ef2ae8f2de323a737
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb
Size/MD5: 202996 8938160f148e63de63cad64e2721c6d6
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb
Size/MD5: 210320 865aa2d674736978b2b00a8623267fc4
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb
Size/MD5: 204034 211f90a72d775d1987b6c3179786546f
.
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.
Download the free PSI BETA from the Secunia website: https://psi.secunia.com/
TITLE: BIND 8 Predictable DNS Query IDs Vulnerability
SECUNIA ADVISORY ID: SA26629
VERIFY ADVISORY: http://secunia.com/advisories/26629/
CRITICAL: Moderately critical
IMPACT: Spoofing
WHERE:
From remote
SOFTWARE: ISC BIND 8.x.x http://secunia.com/product/76/
DESCRIPTION: Amit Klein has reported a vulnerability in BIND, which can be exploited by malicious people to poison the DNS cache.
The vulnerability is caused due to predictable query IDs in outgoing queries (e.g.
Reportedly, the probability to guess the next query ID is between 25% and 43%, depending on the handled DNS traffic.
The vulnerability is reported in BIND 8.x versions prior to 8.4.7-P1.
SOLUTION: Update to BIND 8.4.7-P1.
NOTE: BIND 8.x has reached "End of Life". The vendor advises all users to upgrade to BIND 9.4.1-P1.
PROVIDED AND/OR DISCOVERED BY: Amit Klein
ORIGINAL ADVISORY: ISC: http://www.isc.org/index.pl?/sw/bind/bind8-eol.php
Trusteer: http://www.trusteer.com/docs/bind8dns.html
OTHER REFERENCES: US-CERT VU#927905: http://www.kb.cert.org/vuls/id/927905
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1619-2 security@debian.org http://www.debian.org/security/ Devin Carraway September 22, 2008 http://www.debian.org/security/faq
Package : python-dns Vulnerability : DNS response spoofing Problem type : remote Debian-specific: no CVE Id(s) : CVE-2008-1447 Debian Bug : 490217
In DSA-1619-1, an update was announced for DNS response spoofing vulnerabilities in python-dns. The fix introduced a regression in the library breaking the resolution of UTF-8 encoded record names. An updated release is available which corrects this problem. For reference, the original advisory text follows.
Multiple weaknesses have been identified in PyDNS, a DNS client implementation for the Python language. Dan Kaminsky identified a practical vector of DNS response spoofing and cache poisoning, exploiting the limited entropy in a DNS transaction ID and lack of UDP source port randomization in many DNS implementations. Scott Kitterman noted that python-dns is vulnerable to this predictability, as it randomizes neither its transaction ID nor its source port. Taken together, this lack of entropy leaves applications using python-dns to perform DNS queries highly susceptible to response forgery.
The Common Vulnerabilities and Exposures project identifies this class of weakness as CVE-2008-1447.
For the stable distribution (etch), these problems have been fixed in version 2.3.0-5.2+etch2.
We recommend that you upgrade your python-dns package.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Debian (stable)
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.diff.gz Size/MD5 checksum: 3807 4c9dceefe0dfc4ee933f3c9298764153 http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz Size/MD5 checksum: 21084 82d377c6a59181072b30b0da4e9835b8 http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.dsc Size/MD5 checksum: 695 16b84a9d56bdd4baf5cdf1bf7e413521
Architecture independent packages:
http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2_all.deb Size/MD5 checksum: 22972 59775332c3bb11b1408c83cf25b8e253
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFI1zZ3U5XKDemr/NIRAj/fAKDW30OzI8426TLokTZohgj5GNBa3wCg36qG 5+lokOAioaVH2Y4vJsDYM8o= =rINc -----END PGP SIGNATURE----- .
- The default value for query_port_start was set to 0, disabling UDP source port randomization for outgoing queries (CVE-2008-1447). The first issue can be exploited by enticing pdnsd to send a query to a malicious DNS server, or using the port randomization weakness, and might lead to a Denial of Service.
Workaround
Port randomization can be enabled by setting the "query_port_start" option to 1024 which would resolve the CVE-2008-1447 issue. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200812-17
http://security.gentoo.org/
Severity: Normal Title: Ruby: Multiple vulnerabilities Date: December 16, 2008 Bugs: #225465, #236060 ID: 200812-17
Synopsis
Multiple vulnerabilities have been discovered in Ruby that allow for attacks including arbitrary code execution and Denial of Service.
Background
Ruby is an interpreted object-oriented programming language. The elaborate standard library includes an HTTP server ("WEBRick") and a class for XML parsing ("REXML").
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/ruby < 1.8.6_p287-r1 >= 1.8.6_p287-r1
Description
Multiple vulnerabilities have been discovered in the Ruby interpreter and its standard libraries. Drew Yao of Apple Product Security discovered the following flaws:
-
Arbitrary code execution or Denial of Service (memory corruption) in the rb_str_buf_append() function (CVE-2008-2662).
-
Arbitrary code execution or Denial of Service (memory corruption) in the rb_ary_stor() function (CVE-2008-2663).
-
Memory corruption via alloca in the rb_str_format() function (CVE-2008-2664).
-
Memory corruption ("REALLOC_N") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2725).
-
Memory corruption ("beg + rlen") in the rb_ary_splice() and rb_ary_replace() functions (CVE-2008-2726).
Furthermore, several other vulnerabilities have been reported:
-
Tanaka Akira reported an issue with resolv.rb that enables attackers to spoof DNS responses (CVE-2008-1447).
-
Akira Tagoh of RedHat discovered a Denial of Service (crash) issue in the rb_ary_fill() function in array.c (CVE-2008-2376).
-
Several safe level bypass vulnerabilities were discovered and reported by Keita Yamaguchi (CVE-2008-3655).
-
Christian Neukirchen is credited for discovering a Denial of Service (CPU consumption) attack in the WEBRick HTTP server (CVE-2008-3656).
-
A fault in the dl module allowed the circumvention of taintness checks which could possibly lead to insecure code execution was reported by "sheepman" (CVE-2008-3657).
-
Luka Treiber and Mitja Kolsek (ACROS Security) disclosed a Denial of Service (CPU consumption) vulnerability in the REXML module when dealing with recursive entity expansion (CVE-2008-3790).
Impact
These vulnerabilities allow remote attackers to execute arbitrary code, spoof DNS responses, bypass Ruby's built-in security and taintness checks, and cause a Denial of Service via crash or CPU exhaustion.
Workaround
There is no known workaround at this time.
Resolution
All Ruby users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p287-r1"
References
[ 1 ] CVE-2008-1447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447 [ 2 ] CVE-2008-2376 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376 [ 3 ] CVE-2008-2662 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662 [ 4 ] CVE-2008-2663 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663 [ 5 ] CVE-2008-2664 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664 [ 6 ] CVE-2008-2725 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725 [ 7 ] CVE-2008-2726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726 [ 8 ] CVE-2008-3655 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655 [ 9 ] CVE-2008-3656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656 [ 10 ] CVE-2008-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657 [ 11 ] CVE-2008-3790 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790 [ 12 ] CVE-2008-3905 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200812-17.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
Background
Dnsmasq is a lightweight and easily-configurable DNS forwarder and DHCP server.
- Carlos Carvalho reported that dnsmasq in the 2.43 version does not properly handle clients sending inform or renewal queries for unknown DHCP leases, leading to a crash (CVE-2008-3350).
Impact
A remote attacker could send spoofed DNS response traffic to dnsmasq, possibly involving generating queries via multiple vectors, and spoof DNS replies, which could e.g. lead to the redirection of web or mail traffic to malicious sites. Furthermore, an attacker could generate invalid DHCP traffic and cause a Denial of Service. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "bind",
"scope": "eq",
"trust": 1.8,
"vendor": "isc",
"version": "8"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 1.6,
"vendor": "internet consortium",
"version": null
},
{
"_id": null,
"model": "bind",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "4"
},
{
"_id": null,
"model": "bind",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "9.2.9"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "alcatel lucent",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple computer",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "avaya",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "blue coat",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "bluecat",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "debian gnu linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "force10",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "freebsd",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "funkwerk",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "gentoo linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "infoblox",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "mandriva",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "microsoft",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nixu",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nominum",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nortel",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "novell",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "openbsd",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "openwall gnu linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "qnx",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "suse linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "secure computing network security division",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "slackware linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "sun microsystems",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ubuntu",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "wind river",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "dnsmasq",
"version": null
},
{
"_id": null,
"model": "aix",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "5.2"
},
{
"_id": null,
"model": "aix",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "5.3"
},
{
"_id": null,
"model": "aix",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "6.1"
},
{
"_id": null,
"model": "bind",
"scope": "eq",
"trust": 0.8,
"vendor": "isc",
"version": "9"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.4.11"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5 to v10.5.4"
},
{
"_id": null,
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.4.11"
},
{
"_id": null,
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5 to v10.5.4"
},
{
"_id": null,
"model": "ipod touch",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v1.1 to v2.0.2"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8624el"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8624ps"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8724sl"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8724sl v2"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8724xl"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8748sl"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8748xl"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "8948xl"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9606sx/sc"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9606t"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9812t"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9816gb"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9924sp"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9924t/4sp"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9924ts"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar260s v2"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar410 v2"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar410s v2"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar415s"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar450s"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar550s"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar570s"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar740"
},
{
"_id": null,
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "ar740s"
},
{
"_id": null,
"model": "switchblade4000",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"_id": null,
"model": "id gateway",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.1"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"_id": null,
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(sparc)"
},
{
"_id": null,
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(x86)"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (sparc)"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (x86)"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "8 (sparc)"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "8 (x86)"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "9 (sparc)"
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "9 (x86)"
},
{
"_id": null,
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "12.0"
},
{
"_id": null,
"model": "xr-1100",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.2 previous version"
},
{
"_id": null,
"model": "xr-410",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.9 previous version"
},
{
"_id": null,
"model": "xr-410-l2",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.1 previous version"
},
{
"_id": null,
"model": "xr-440",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.7.7 previous version"
},
{
"_id": null,
"model": "xr-510",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver3.5.3 previous version"
},
{
"_id": null,
"model": "xr-540",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver3.5.2 previous version"
},
{
"_id": null,
"model": "xr-640",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.7 previous version"
},
{
"_id": null,
"model": "xr-640-l2",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver1.6.1 previous version"
},
{
"_id": null,
"model": "xr-730",
"scope": "eq",
"trust": 0.8,
"vendor": "century",
"version": "ver3.5.0 previous version"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "1.0 (hosting)"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "1.0 (workgroup)"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "2.0"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "3.0"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "3.0 (x64)"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10 (x64)"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "11"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "11 (x64)"
},
{
"_id": null,
"model": "hp tru64 unix",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "v 5.1b-3"
},
{
"_id": null,
"model": "hp tru64 unix",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "v 5.1b-4"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.11"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.23"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.31"
},
{
"_id": null,
"model": "windows 2000",
"scope": null,
"trust": 0.8,
"vendor": "microsoft",
"version": null
},
{
"_id": null,
"model": "windows server 2003",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "none"
},
{
"_id": null,
"model": "windows server 2003",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64)"
},
{
"_id": null,
"model": "windows xp",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "(x64)"
},
{
"_id": null,
"model": "windows xp",
"scope": "eq",
"trust": 0.8,
"vendor": "microsoft",
"version": "sp3"
},
{
"_id": null,
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rt100i"
},
{
"_id": null,
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt102i"
},
{
"_id": null,
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt103i"
},
{
"_id": null,
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt200i"
},
{
"_id": null,
"model": "rt series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt80i)"
},
{
"_id": null,
"model": "rt105 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rt105i"
},
{
"_id": null,
"model": "rt105 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt105e"
},
{
"_id": null,
"model": "rt105 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt105p)"
},
{
"_id": null,
"model": "rt107e",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "rt140 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rt140i"
},
{
"_id": null,
"model": "rt140 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt140e"
},
{
"_id": null,
"model": "rt140 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt140p"
},
{
"_id": null,
"model": "rt140 series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rt140f)"
},
{
"_id": null,
"model": "rt300i",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "rt58i",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "rta series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rta55i"
},
{
"_id": null,
"model": "rta series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rta54i"
},
{
"_id": null,
"model": "rta series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rta52i"
},
{
"_id": null,
"model": "rta series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rta50i)"
},
{
"_id": null,
"model": "rtv series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rtv700"
},
{
"_id": null,
"model": "rtv series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rtv01)"
},
{
"_id": null,
"model": "rtw series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "(rt60w"
},
{
"_id": null,
"model": "rtw series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rtw65i"
},
{
"_id": null,
"model": "rtw series",
"scope": "eq",
"trust": 0.8,
"vendor": "yamaha",
"version": "rtw65b)"
},
{
"_id": null,
"model": "rtx1000",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "rtx1100",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "rtx1500",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "rtx2000",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "rtx3000",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "srt100",
"scope": null,
"trust": 0.8,
"vendor": "yamaha",
"version": null
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (server)"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3.0"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.0"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.0 (client)"
},
{
"_id": null,
"model": "linux advanced workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1"
},
{
"_id": null,
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (client)"
},
{
"_id": null,
"model": "fitelnet-e series",
"scope": "eq",
"trust": 0.8,
"vendor": "furukawa electric",
"version": "fitelnet-e20/e30"
},
{
"_id": null,
"model": "fitelnet-f series",
"scope": "eq",
"trust": 0.8,
"vendor": "furukawa electric",
"version": "fitelnet-f40"
},
{
"_id": null,
"model": "fitelnet-f series",
"scope": "eq",
"trust": 0.8,
"vendor": "furukawa electric",
"version": "fitelnet-f80/f100/f120/f140/f1000/f2000"
},
{
"_id": null,
"model": "ip38x series",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"_id": null,
"model": "ix1000 series",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"_id": null,
"model": "ix2000 series",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"_id": null,
"model": "ix3000 series",
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"_id": null,
"model": "ipcom series",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.6,
"vendor": "redhat",
"version": "5"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.6,
"vendor": "redhat",
"version": "2.1"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.6,
"vendor": "redhat",
"version": "5.0"
},
{
"_id": null,
"model": "linux advanced workstation",
"scope": "eq",
"trust": 0.6,
"vendor": "redhat",
"version": "2.1"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#927905"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:ibm:aix",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:isc:bind",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:apple:ipod_touch",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:centrecom",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade4000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:sun:opensolaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:sun:solaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:ios",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-1100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-410",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-410-l2",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-440",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-510",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-540",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-640",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-640-l2",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:centurysys:xr-730",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_appliance_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:hp:tru64",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:hp:hp-ux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:microsoft:windows_2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:microsoft:windows_server_2003",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:microsoft:windows_xp",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rt",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rt105",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rt107e",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rt140",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rt300i",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rt58i_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rta",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rtv",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rtw",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rtx1000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rtx1100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rtx1500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rtx2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:rtx3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:yamaha:srt100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:furukawa_electric:fitelnet",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:furukawa_electric:fitelnet-f",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:nec:ip38x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:nec:ix1000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:nec:ix2000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:nec:ix3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:ipcom",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
}
]
},
"credits": {
"_id": null,
"data": "Dan Kaminsky",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
}
],
"trust": 0.6
},
"cve": "CVE-2008-1447",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2008-1447",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.4,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2008-1447",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-31572",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"id": "CVE-2008-1447",
"impactScore": 4.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2008-1447",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#800113",
"trust": 0.8,
"value": "27.54"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#927905",
"trust": 0.8,
"value": "2.14"
},
{
"author": "NVD",
"id": "CVE-2008-1447",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-200807-129",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-31572",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#927905"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"description": {
"_id": null,
"data": "The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka \"DNS Insufficient Socket Entropy Vulnerability\" or \"the Kaminsky bug.\". ISC BIND version 8 generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. plural DNS There is a vulnerability in the implementation that makes cache poisoning attacks easier. Recent research has found a more efficient method of cash poisoning than previously known. DNS As a cache server, PC Please note that there is a possibility of attack. Cash poisoning attack forged response This is done by sending a packet. query The source port of the packet query By changing the value randomly every time, the probability of a successful cache poisoning attack can be reduced.By cash poisoning attack DNS Fake cache server DNS Information can be cached and DNS Nodes using the cache server may be directed to fake sites. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. And spoof the address returned by the DNS response. =========================================================== \nUbuntu Security Notice USN-627-1 July 22, 2008\ndnsmasq vulnerability\nCVE-2008-1447\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 8.04 LTS\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 8.04 LTS:\n dnsmasq-base 2.41-2ubuntu2.1\n\nAfter a standard system upgrade you need to restart Dnsmasq to effect\nthe necessary changes. \n\nDetails follow:\n\nDan Kaminsky discovered weaknesses in the DNS protocol as implemented\nby Dnsmasq. \n\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz\n Size/MD5: 22023 89c0f060733a11e414ef1fa634b17149\n http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc\n Size/MD5: 698 e44ebdb66be7abcaba3f1558b9379abb\n http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz\n Size/MD5: 357997 8d0acd6656299a800c4d1be5a1193e39\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb\n Size/MD5: 11962 fbe42757babf0522e92a48438cdf7d0b\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb\n Size/MD5: 210032 015334862975edd0c6157624b9b4cd6b\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb\n Size/MD5: 202466 87bebd172bae955ef2ae8f2de323a737\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb\n Size/MD5: 202996 8938160f148e63de63cad64e2721c6d6\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb\n Size/MD5: 210320 865aa2d674736978b2b00a8623267fc4\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb\n Size/MD5: 204034 211f90a72d775d1987b6c3179786546f\n\n\n. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nDownload the free PSI BETA from the Secunia website:\nhttps://psi.secunia.com/\n\n----------------------------------------------------------------------\n\nTITLE:\nBIND 8 Predictable DNS Query IDs Vulnerability\n\nSECUNIA ADVISORY ID:\nSA26629\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26629/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSpoofing\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nISC BIND 8.x.x\nhttp://secunia.com/product/76/\n\nDESCRIPTION:\nAmit Klein has reported a vulnerability in BIND, which can be\nexploited by malicious people to poison the DNS cache. \n\nThe vulnerability is caused due to predictable query IDs in outgoing\nqueries (e.g. \n\nReportedly, the probability to guess the next query ID is between 25%\nand 43%, depending on the handled DNS traffic. \n\nThe vulnerability is reported in BIND 8.x versions prior to 8.4.7-P1. \n\nSOLUTION:\nUpdate to BIND 8.4.7-P1. \n\nNOTE: BIND 8.x has reached \"End of Life\". The vendor advises all\nusers to upgrade to BIND 9.4.1-P1. \n\nPROVIDED AND/OR DISCOVERED BY:\nAmit Klein\n\nORIGINAL ADVISORY:\nISC:\nhttp://www.isc.org/index.pl?/sw/bind/bind8-eol.php\n\nTrusteer:\nhttp://www.trusteer.com/docs/bind8dns.html\n\nOTHER REFERENCES:\nUS-CERT VU#927905:\nhttp://www.kb.cert.org/vuls/id/927905\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1619-2 security@debian.org\nhttp://www.debian.org/security/ Devin Carraway\nSeptember 22, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : python-dns\nVulnerability : DNS response spoofing\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2008-1447\nDebian Bug : 490217\n\nIn DSA-1619-1, an update was announced for DNS response spoofing\nvulnerabilities in python-dns. The fix introduced a regression in the\nlibrary breaking the resolution of UTF-8 encoded record names. An\nupdated release is available which corrects this problem. For\nreference, the original advisory text follows. \n\nMultiple weaknesses have been identified in PyDNS, a DNS client\nimplementation for the Python language. Dan Kaminsky identified a\npractical vector of DNS response spoofing and cache poisoning,\nexploiting the limited entropy in a DNS transaction ID and lack of\nUDP source port randomization in many DNS implementations. Scott\nKitterman noted that python-dns is vulnerable to this predictability,\nas it randomizes neither its transaction ID nor its source port. \nTaken together, this lack of entropy leaves applications using\npython-dns to perform DNS queries highly susceptible to response\nforgery. \n\nThe Common Vulnerabilities and Exposures project identifies this\nclass of weakness as CVE-2008-1447. \n\nFor the stable distribution (etch), these problems have been fixed in\nversion 2.3.0-5.2+etch2. \n\nWe recommend that you upgrade your python-dns package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.diff.gz\n Size/MD5 checksum: 3807 4c9dceefe0dfc4ee933f3c9298764153\n http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz\n Size/MD5 checksum: 21084 82d377c6a59181072b30b0da4e9835b8\n http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.dsc\n Size/MD5 checksum: 695 16b84a9d56bdd4baf5cdf1bf7e413521\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2_all.deb\n Size/MD5 checksum: 22972 59775332c3bb11b1408c83cf25b8e253\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFI1zZ3U5XKDemr/NIRAj/fAKDW30OzI8426TLokTZohgj5GNBa3wCg36qG\n5+lokOAioaVH2Y4vJsDYM8o=\n=rINc\n-----END PGP SIGNATURE-----\n. \n\n* The default value for query_port_start was set to 0, disabling UDP\n source port randomization for outgoing queries (CVE-2008-1447). The first issue\ncan be exploited by enticing pdnsd to send a query to a malicious DNS\nserver, or using the port randomization weakness, and might lead to a\nDenial of Service. \n\nWorkaround\n==========\n\nPort randomization can be enabled by setting the \"query_port_start\"\noption to 1024 which would resolve the CVE-2008-1447 issue. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200812-17\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Ruby: Multiple vulnerabilities\n Date: December 16, 2008\n Bugs: #225465, #236060\n ID: 200812-17\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in Ruby that allow for\nattacks including arbitrary code execution and Denial of Service. \n\nBackground\n==========\n\nRuby is an interpreted object-oriented programming language. The\nelaborate standard library includes an HTTP server (\"WEBRick\") and a\nclass for XML parsing (\"REXML\"). \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-lang/ruby \u003c 1.8.6_p287-r1 \u003e= 1.8.6_p287-r1\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in the Ruby interpreter\nand its standard libraries. Drew Yao of Apple Product Security\ndiscovered the following flaws:\n\n* Arbitrary code execution or Denial of Service (memory corruption)\n in the rb_str_buf_append() function (CVE-2008-2662). \n\n* Arbitrary code execution or Denial of Service (memory corruption)\n in the rb_ary_stor() function (CVE-2008-2663). \n\n* Memory corruption via alloca in the rb_str_format() function\n (CVE-2008-2664). \n\n* Memory corruption (\"REALLOC_N\") in the rb_ary_splice() and\n rb_ary_replace() functions (CVE-2008-2725). \n\n* Memory corruption (\"beg + rlen\") in the rb_ary_splice() and\n rb_ary_replace() functions (CVE-2008-2726). \n\nFurthermore, several other vulnerabilities have been reported:\n\n* Tanaka Akira reported an issue with resolv.rb that enables\n attackers to spoof DNS responses (CVE-2008-1447). \n\n* Akira Tagoh of RedHat discovered a Denial of Service (crash) issue\n in the rb_ary_fill() function in array.c (CVE-2008-2376). \n\n* Several safe level bypass vulnerabilities were discovered and\n reported by Keita Yamaguchi (CVE-2008-3655). \n\n* Christian Neukirchen is credited for discovering a Denial of\n Service (CPU consumption) attack in the WEBRick HTTP server\n (CVE-2008-3656). \n\n* A fault in the dl module allowed the circumvention of taintness\n checks which could possibly lead to insecure code execution was\n reported by \"sheepman\" (CVE-2008-3657). \n\n* Luka Treiber and Mitja Kolsek (ACROS Security) disclosed a Denial\n of Service (CPU consumption) vulnerability in the REXML module when\n dealing with recursive entity expansion (CVE-2008-3790). \n\nImpact\n======\n\nThese vulnerabilities allow remote attackers to execute arbitrary code,\nspoof DNS responses, bypass Ruby\u0027s built-in security and taintness\nchecks, and cause a Denial of Service via crash or CPU exhaustion. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Ruby users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-lang/ruby-1.8.6_p287-r1\"\n\nReferences\n==========\n\n [ 1 ] CVE-2008-1447\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447\n [ 2 ] CVE-2008-2376\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376\n [ 3 ] CVE-2008-2662\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662\n [ 4 ] CVE-2008-2663\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663\n [ 5 ] CVE-2008-2664\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664\n [ 6 ] CVE-2008-2725\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725\n [ 7 ] CVE-2008-2726\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726\n [ 8 ] CVE-2008-3655\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655\n [ 9 ] CVE-2008-3656\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656\n [ 10 ] CVE-2008-3657\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657\n [ 11 ] CVE-2008-3790\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790\n [ 12 ] CVE-2008-3905\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200812-17.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2008 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n. \n\nBackground\n==========\n\nDnsmasq is a lightweight and easily-configurable DNS forwarder and DHCP\nserver. \n\n* Carlos Carvalho reported that dnsmasq in the 2.43 version does not\n properly handle clients sending inform or renewal queries for unknown\n DHCP leases, leading to a crash (CVE-2008-3350). \n\nImpact\n======\n\nA remote attacker could send spoofed DNS response traffic to dnsmasq,\npossibly involving generating queries via multiple vectors, and spoof\nDNS replies, which could e.g. lead to the redirection of web or mail\ntraffic to malicious sites. Furthermore, an attacker could generate\ninvalid DHCP traffic and cause a Denial of Service. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-1447"
},
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#927905"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "PACKETSTORM",
"id": "68412"
},
{
"db": "PACKETSTORM",
"id": "58910"
},
{
"db": "PACKETSTORM",
"id": "70207"
},
{
"db": "PACKETSTORM",
"id": "73732"
},
{
"db": "PACKETSTORM",
"id": "73060"
},
{
"db": "PACKETSTORM",
"id": "69643"
},
{
"db": "PACKETSTORM",
"id": "68546"
}
],
"trust": 3.78
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-31572",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-31572"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#800113",
"trust": 3.3
},
{
"db": "NVD",
"id": "CVE-2008-1447",
"trust": 3.1
},
{
"db": "SECUNIA",
"id": "30980",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "31014",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "30925",
"trust": 2.5
},
{
"db": "USCERT",
"id": "TA08-190B",
"trust": 2.5
},
{
"db": "USCERT",
"id": "TA08-260A",
"trust": 2.5
},
{
"db": "USCERT",
"id": "TA08-190A",
"trust": 2.5
},
{
"db": "BID",
"id": "30131",
"trust": 2.5
},
{
"db": "VUPEN",
"id": "ADV-2008-2025",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2009-0297",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2334",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2383",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2113",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2558",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2019",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2377",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2584",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2342",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2010-0622",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2166",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2051",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2092",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2029",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2384",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2268",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2052",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2549",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2197",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2009-0311",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2055",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2467",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2123",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2482",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2525",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2023",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2582",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2114",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2196",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2139",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2466",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2050",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2195",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2291",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2008-2030",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020548",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020578",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020448",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020558",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020702",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020440",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020575",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020437",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020802",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020449",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020579",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020561",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020804",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020577",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020560",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020651",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020653",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020438",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1020576",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31209",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31197",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31422",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "30977",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31151",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31354",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31093",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31212",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31207",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31221",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31254",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31451",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31169",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "30988",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "30973",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31687",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31199",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31137",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "30998",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31065",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31882",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31019",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31153",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31482",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31495",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "33178",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "33714",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31213",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31326",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31052",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31011",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31588",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31033",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31031",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31430",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "30979",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31022",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31094",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31030",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31204",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31072",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31152",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31237",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31012",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "33786",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31143",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31236",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31900",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "30989",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "31823",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "6130",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "6123",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "6122",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "26629",
"trust": 1.0
},
{
"db": "CERT/CC",
"id": "VU#927905",
"trust": 0.9
},
{
"db": "USCERT",
"id": "SA08-190A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "68412",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "73060",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "73732",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "70207",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68546",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68878",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68038",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68755",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68118",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68502",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68061",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "74443",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68288",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "96747",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "94774",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68199",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68183",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68068",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68471",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68039",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68036",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68500",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68691",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68360",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68037",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68473",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68129",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68554",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68063",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "68543",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-65607",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-31572",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58910",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "69643",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#927905"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "PACKETSTORM",
"id": "68412"
},
{
"db": "PACKETSTORM",
"id": "58910"
},
{
"db": "PACKETSTORM",
"id": "70207"
},
{
"db": "PACKETSTORM",
"id": "73732"
},
{
"db": "PACKETSTORM",
"id": "73060"
},
{
"db": "PACKETSTORM",
"id": "69643"
},
{
"db": "PACKETSTORM",
"id": "68546"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"id": "VAR-200707-0675",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-31572"
}
],
"trust": 0.01
},
"last_update_date": "2026-03-09T20:23:02.481000Z",
"patch": {
"_id": null,
"data": [
{
"title": "APPLE-SA-2008-09-12",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"title": "APPLE-SA-2008-09-15",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
},
{
"title": "APPLE-SA-2008-07-31",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
},
{
"title": "APPLE-SA-2008-09-09",
"trust": 0.8,
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"title": "Security Update 2008-006",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3137"
},
{
"title": "Security Update 2008-005",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT2647"
},
{
"title": "iPod touch v2.1",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3026"
},
{
"title": "bind-9.3.3-10.4AXS3",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=140"
},
{
"title": "dnsmasq-2.45-1AXS3.1.1",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=345"
},
{
"title": "cisco-sa-20080708-dns",
"trust": 0.8,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml"
},
{
"title": "20080709",
"trust": 0.8,
"url": "http://www.furukawa.co.jp/fitelnet/topic/vulnera_20080709.html"
},
{
"title": "DNS cache poisoning",
"trust": 0.8,
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
},
{
"title": "JVNVU800113",
"trust": 0.8,
"url": "http://www.centurysys.co.jp/support/xr_common/JVNVU800113.html"
},
{
"title": "HPSBUX02351",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01506861"
},
{
"title": "HPSBOV02357 SSRT080058",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01662368"
},
{
"title": "HPSBMP02404 SSRT090014",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01660723"
},
{
"title": "HPSBUX02358",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01527346"
},
{
"title": "IZ26672",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26672"
},
{
"title": "IZ26667",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26667"
},
{
"title": "IZ26668",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26668"
},
{
"title": "IZ26671",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26671"
},
{
"title": "IZ26670",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26670"
},
{
"title": "IZ26669",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ26669"
},
{
"title": "4525",
"trust": 0.8,
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4525"
},
{
"title": "4338",
"trust": 0.8,
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=4338"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.iij.ad.jp"
},
{
"title": "CERT VU#800113 DNS Cache Poisoning Issue",
"trust": 0.8,
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"title": "956187",
"trust": 0.8,
"url": "http://www.microsoft.com/technet/security/advisory/956187.mspx"
},
{
"title": "MS08-037",
"trust": 0.8,
"url": "http://www.microsoft.com/technet/security/bulletin/MS08-037.mspx"
},
{
"title": "1316",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1316"
},
{
"title": "1649",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1649"
},
{
"title": "1296",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1296"
},
{
"title": "1297",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1297"
},
{
"title": "NV08-008",
"trust": 0.8,
"url": "http://www.nec.co.jp/security-info/secinfo/nv08-008.html"
},
{
"title": "RHSA-2008:0789",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2008-0789.html"
},
{
"title": "RHSA-2008:0533",
"trust": 0.8,
"url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
},
{
"title": "VU800113",
"trust": 0.8,
"url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
},
{
"title": "239392",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-239392-1"
},
{
"title": "240048",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-240048-1"
},
{
"title": "dns_12",
"trust": 0.8,
"url": "http://fenics.fujitsu.com/products/support/2008/dns_12.html"
},
{
"title": "DNS\u306b\u95a2\u3059\u308b\u30ad\u30e3\u30c3\u30b7\u30e5\u30dd\u30a4\u30ba\u30cb\u30f3\u30b0\u8106\u5f31\u6027\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://www.allied-telesis.co.jp/support/list/faq/vuls/20080813.html"
},
{
"title": "956187",
"trust": 0.8,
"url": "http://www.microsoft.com/japan/technet/security/advisory/956187.mspx"
},
{
"title": "MS08-037",
"trust": 0.8,
"url": "http://www.microsoft.com/japan/technet/security/bulletin/ms08-037.mspx"
},
{
"title": "RHSA-2008:0533",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0533J.html"
},
{
"title": "RHSA-2008:0789",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0789J.html"
},
{
"title": "MS08-037e",
"trust": 0.8,
"url": "http://www.microsoft.com/japan/security/bulletins/MS08-037e.mspx"
},
{
"title": "TLSA-2008-26",
"trust": 0.8,
"url": "http://www.turbolinux.co.jp/security/2008/TLSA-2008-26j.txt"
},
{
"title": "TA08-190A",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-190a.html"
},
{
"title": "TA08-190B",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-190b.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-331",
"trust": 1.1
},
{
"problemtype": "CWE-20",
"trust": 0.8
},
{
"problemtype": "CWE-310",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/30131"
},
{
"trust": 2.5,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-190a.html"
},
{
"trust": 2.5,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-190b.html"
},
{
"trust": 2.5,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-260a.html"
},
{
"trust": 2.5,
"url": "http://www.kb.cert.org/vuls/id/800113"
},
{
"trust": 2.3,
"url": "http://support.citrix.com/article/ctx117991"
},
{
"trust": 2.3,
"url": "http://support.citrix.com/article/ctx118183"
},
{
"trust": 1.8,
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"trust": 1.7,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26667"
},
{
"trust": 1.7,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26668"
},
{
"trust": 1.7,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26669"
},
{
"trust": 1.7,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26670"
},
{
"trust": 1.7,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26671"
},
{
"trust": 1.7,
"url": "http://www.ibm.com/support/docview.wss?uid=isg1iz26672"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce//2008/jul/msg00003.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce//2008/sep/msg00005.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"trust": 1.7,
"url": "http://www.cisco.com/en/us/products/products_security_advisory09186a00809c2168.shtml"
},
{
"trust": 1.7,
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"trust": 1.7,
"url": "http://support.apple.com/kb/ht3026"
},
{
"trust": 1.7,
"url": "http://support.apple.com/kb/ht3129"
},
{
"trust": 1.7,
"url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
},
{
"trust": 1.7,
"url": "http://wiki.rpath.com/wiki/advisories:rpsa-2008-0231"
},
{
"trust": 1.7,
"url": "http://wiki.rpath.com/wiki/advisories:rpsa-2010-0018"
},
{
"trust": 1.7,
"url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
},
{
"trust": 1.7,
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
},
{
"trust": 1.7,
"url": "http://www.kb.cert.org/vuls/id/mimg-7dwr4j"
},
{
"trust": 1.7,
"url": "http://www.kb.cert.org/vuls/id/mimg-7ecl8q"
},
{
"trust": 1.7,
"url": "http://www.novell.com/support/viewcontent.do?externalid=7000912"
},
{
"trust": 1.7,
"url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
},
{
"trust": 1.7,
"url": "http://www.phys.uu.nl/~rombouts/pdnsd/changelog"
},
{
"trust": 1.7,
"url": "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu800113.html"
},
{
"trust": 1.7,
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"trust": 1.7,
"url": "http://www.vmware.com/security/advisories/vmsa-2008-0014.html"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2008/dsa-1603"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2008/dsa-1604"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2008/dsa-1605"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2008/dsa-1619"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2008/dsa-1623"
},
{
"trust": 1.7,
"url": "https://www.exploit-db.com/exploits/6122"
},
{
"trust": 1.7,
"url": "https://www.exploit-db.com/exploits/6123"
},
{
"trust": 1.7,
"url": "https://www.exploit-db.com/exploits/6130"
},
{
"trust": 1.7,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00402.html"
},
{
"trust": 1.7,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-july/msg00458.html"
},
{
"trust": 1.7,
"url": "http://security.freebsd.org/advisories/freebsd-sa-08:06.bind.asc"
},
{
"trust": 1.7,
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-august/064118.html"
},
{
"trust": 1.7,
"url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
},
{
"trust": 1.7,
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"trust": 1.7,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01662368"
},
{
"trust": 1.7,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01523520"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:139"
},
{
"trust": 1.7,
"url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
},
{
"trust": 1.7,
"url": "http://www.caughq.org/exploits/cau-ex-2008-0002.txt"
},
{
"trust": 1.7,
"url": "http://www.caughq.org/exploits/cau-ex-2008-0003.txt"
},
{
"trust": 1.7,
"url": "http://www.doxpara.com/?p=1176"
},
{
"trust": 1.7,
"url": "http://www.doxpara.com/dmk_bo2k8.ppt"
},
{
"trust": 1.7,
"url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
},
{
"trust": 1.7,
"url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
},
{
"trust": 1.7,
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
},
{
"trust": 1.7,
"url": "http://www.openbsd.org/errata42.html#013_bind"
},
{
"trust": 1.7,
"url": "http://www.openbsd.org/errata43.html#004_bind"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12117"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5725"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5761"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5917"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9627"
},
{
"trust": 1.7,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0533.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0789.html"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020437"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020438"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020440"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020448"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020449"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020548"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020558"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020560"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020561"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020575"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020576"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020577"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020578"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020579"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020651"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020653"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020702"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020802"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1020804"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30925"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30973"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30977"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30979"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30980"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30988"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30989"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/30998"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31011"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31012"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31014"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31019"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31022"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31030"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31031"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31033"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31052"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31065"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31072"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31093"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31094"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31137"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31143"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31151"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31152"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31153"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31169"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31197"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31199"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31204"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31207"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31209"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31212"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31213"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31221"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31236"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31237"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31254"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31326"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31354"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31422"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31430"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31451"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31482"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31495"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31588"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31687"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31823"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31882"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/31900"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/33178"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/33714"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/33786"
},
{
"trust": 1.7,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
},
{
"trust": 1.7,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
},
{
"trust": 1.7,
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
},
{
"trust": 1.7,
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
},
{
"trust": 1.7,
"url": "http://www.ubuntu.com/usn/usn-622-1"
},
{
"trust": 1.7,
"url": "http://www.ubuntu.com/usn/usn-627-1"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2019/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2023/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2025/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2029/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2030/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2050/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2051/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2052/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2055/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2092/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2113/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2114/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2123/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2139/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2166/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2195/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2196/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2197/references"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2268"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2291"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2342"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2377"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2383"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2384"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2467"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2482"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2549"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2582"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2008/2584"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2009/0297"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2009/0311"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2010/0622"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/rfc3833"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/rfc2827"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/rfc3704"
},
{
"trust": 1.6,
"url": "http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization"
},
{
"trust": 1.6,
"url": "http://www.ipcop.org/index.php?name=news\u0026file=article\u0026sid=40"
},
{
"trust": 1.6,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026id=762152"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=141879471518471\u0026w=2"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=123324863916385\u0026w=2"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=121866517322103\u0026w=2"
},
{
"trust": 1.6,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.452680"
},
{
"trust": 1.6,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.539239"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=121630706004256\u0026w=2"
},
{
"trust": 1.1,
"url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2008-009.txt.asc"
},
{
"trust": 1.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1447"
},
{
"trust": 0.9,
"url": "http://www.isc.org/index.pl?/sw/bind/bind8-eol.php"
},
{
"trust": 0.9,
"url": "http://www.trusteer.com/docs/bind8dns.html"
},
{
"trust": 0.9,
"url": "http://secunia.com/advisories/26629/"
},
{
"trust": 0.8,
"url": "http://csrc.nist.gov/publications/nistpubs/800-81/sp800-81.pdf"
},
{
"trust": 0.8,
"url": "http://tools.ietf.org/html/rfc3013"
},
{
"trust": 0.8,
"url": "http://tools.ietf.org/html/rfc4033"
},
{
"trust": 0.8,
"url": "http://cr.yp.to/djbdns/dns_random.html"
},
{
"trust": 0.8,
"url": "http://cr.yp.to/djbdns/dns_transmit.html"
},
{
"trust": 0.8,
"url": "http://cr.yp.to/djbdns/forgery.html"
},
{
"trust": 0.8,
"url": "http://www.trusteer.com/microsoftdns"
},
{
"trust": 0.8,
"url": "http://www.trusteer.com/bind9dns"
},
{
"trust": 0.8,
"url": "http://www.trusteer.com/bind8dns"
},
{
"trust": 0.8,
"url": "http://www.sans.org/reading_room/whitepapers/dns/1567.php"
},
{
"trust": 0.8,
"url": "http://blogs.iss.net/archive/morednsnat.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/cert/jvnvu800113/"
},
{
"trust": 0.8,
"url": "http://www.cert.at/static/cert.at-0802-dns-patchanalysis.pdf"
},
{
"trust": 0.8,
"url": "http://www.frsirt.com/english/advisories/2008/2019"
},
{
"trust": 0.8,
"url": "http://www.frsirt.com/english/advisories/2008/2055"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/vuln/documents/2008/200812_dns.html"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/vuln/documents/2009/200912_dns.html"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/vuln/documents/2008/200809_dns.html"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2008/at080013.txt"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2008/at080014.txt"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2014/at140016.html"
},
{
"trust": 0.8,
"url": "http://jprs.jp/tech/security/2014-04-15-portrandomization.html"
},
{
"trust": 0.8,
"url": "http://jprs.jp/tech/security/2014-05-30-poisoning-countermeasure-auth-1.pdf"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu800113/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta08-190a/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta08-190b/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta08-190a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta08-190b/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1447"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/30925/"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/31014/"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/30980/"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/alerts/sa08-190a.html"
},
{
"trust": 0.8,
"url": "http://www.cyberpolice.go.jp/important/2009/20090212_155349.html"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1447"
},
{
"trust": 0.3,
"url": "http://bugs.gentoo.org."
},
{
"trust": 0.3,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.3,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.2,
"url": "http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0.orig.tar.gz"
},
{
"trust": 0.2,
"url": "http://packages.debian.org/\u003cpkg\u003e"
},
{
"trust": 0.2,
"url": "http://security.debian.org/"
},
{
"trust": 0.2,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.2,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026amp;id=762152"
},
{
"trust": 0.1,
"url": "http://www.ipcop.org/index.php?name=news\u0026amp;file=article\u0026amp;sid=40"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=123324863916385\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=141879471518471\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=121866517322103\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=121630706004256\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2008\u0026amp;m=slackware-security.539239"
},
{
"trust": 0.1,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2008\u0026amp;m=slackware-security.452680"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq_2.41-2ubuntu2.1_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/d/dnsmasq/dnsmasq-base_2.41-2ubuntu2.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "https://psi.secunia.com/"
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/927905"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/76/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch2.diff.gz"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4194"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/glsa/glsa-200901-03.xml"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4194"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2376"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2662"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2726"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2376"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3655"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3905"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3790"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2663"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3790"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2664"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2662"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3657"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3656"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2663"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2664"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3655"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3905"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2726"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2725"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2725"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3656"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3657"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/glsa/glsa-200809-02.xml"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3350"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3350"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1_all.deb"
},
{
"trust": 0.1,
"url": "http://secunia.com/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/python-dns/python-dns_2.3.0-5.2+etch1.diff.gz"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
},
{
"db": "CERT/CC",
"id": "VU#927905"
},
{
"db": "VULHUB",
"id": "VHN-31572"
},
{
"db": "PACKETSTORM",
"id": "68412"
},
{
"db": "PACKETSTORM",
"id": "58910"
},
{
"db": "PACKETSTORM",
"id": "70207"
},
{
"db": "PACKETSTORM",
"id": "73732"
},
{
"db": "PACKETSTORM",
"id": "73060"
},
{
"db": "PACKETSTORM",
"id": "69643"
},
{
"db": "PACKETSTORM",
"id": "68546"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495"
},
{
"db": "NVD",
"id": "CVE-2008-1447"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#800113",
"ident": null
},
{
"db": "CERT/CC",
"id": "VU#927905",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-31572",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "68412",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "58910",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "70207",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "73732",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "73060",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "69643",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "68546",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001495",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2008-1447",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2008-07-08T00:00:00",
"db": "CERT/CC",
"id": "VU#800113",
"ident": null
},
{
"date": "2007-08-28T00:00:00",
"db": "CERT/CC",
"id": "VU#927905",
"ident": null
},
{
"date": "2008-07-08T00:00:00",
"db": "VULHUB",
"id": "VHN-31572",
"ident": null
},
{
"date": "2008-07-22T18:01:41",
"db": "PACKETSTORM",
"id": "68412",
"ident": null
},
{
"date": "2007-08-29T04:20:48",
"db": "PACKETSTORM",
"id": "58910",
"ident": null
},
{
"date": "2008-09-22T21:37:12",
"db": "PACKETSTORM",
"id": "70207",
"ident": null
},
{
"date": "2009-01-12T19:16:04",
"db": "PACKETSTORM",
"id": "73732",
"ident": null
},
{
"date": "2008-12-16T21:29:31",
"db": "PACKETSTORM",
"id": "73060",
"ident": null
},
{
"date": "2008-09-04T22:22:48",
"db": "PACKETSTORM",
"id": "69643",
"ident": null
},
{
"date": "2008-07-28T15:27:39",
"db": "PACKETSTORM",
"id": "68546",
"ident": null
},
{
"date": "2008-07-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200807-129",
"ident": null
},
{
"date": "2008-07-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001495",
"ident": null
},
{
"date": "2008-07-08T23:41:00",
"db": "NVD",
"id": "CVE-2008-1447",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2014-04-14T00:00:00",
"db": "CERT/CC",
"id": "VU#800113",
"ident": null
},
{
"date": "2007-08-28T00:00:00",
"db": "CERT/CC",
"id": "VU#927905",
"ident": null
},
{
"date": "2020-03-24T00:00:00",
"db": "VULHUB",
"id": "VHN-31572",
"ident": null
},
{
"date": "2020-03-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200807-129",
"ident": null
},
{
"date": "2014-06-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001495",
"ident": null
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2008-1447",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "68412"
},
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
}
],
"trust": 0.7
},
"title": {
"_id": null,
"data": "Multiple DNS implementations vulnerable to cache poisoning",
"sources": [
{
"db": "CERT/CC",
"id": "VU#800113"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "security feature problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200807-129"
}
],
"trust": 0.6
}
}
VAR-200411-0173
Vulnerability from variot - Updated: 2025-04-03 21:32OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. This vulnerability was addressed in OpenSSL 0.9.6d and 0.9.7. The vulnerability is OpenSSL Applications and systems that use the library may also be affected. For more detailed information about other systems NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please check also.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. For the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. The second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. This entry will be retired when individual BID records are created for each issue. *Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. Oracle has released a Critical Patch Update to address these issues in various supported applications and platforms. The issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. This BID will be divided and updated into separate BIDs when more information is available. An attacker could exploit these vulnerabilities to take complete control of an affected database.
TITLE: Fedora update for openssl096b
SECUNIA ADVISORY ID: SA17381
VERIFY ADVISORY: http://secunia.com/advisories/17381/
CRITICAL: Moderately critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/
DESCRIPTION: Fedora has issued an update for openssl096b. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
For more information: SA10133 SA11139
SOLUTION: Apply updated packages.
Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
8d68e4b430aa7c5ca067c12866ae694e SRPMS/openssl096b-0.9.6b-21.42.src.rpm 54a9e78a2fdd625b9dc9121e09eb4398 x86_64/openssl096b-0.9.6b-21.42.x86_64.rpm c5c6174e23eba8d038889d08f49231b8 x86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm 56b63fc150d0c099b2e4f0950e21005b x86_64/openssl096b-0.9.6b-21.42.i386.rpm 56b63fc150d0c099b2e4f0950e21005b i386/openssl096b-0.9.6b-21.42.i386.rpm 93195495585c7e9789041c75b1ed5380 i386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm
OTHER REFERENCES: SA10133: http://secunia.com/advisories/10133/
SA11139: http://secunia.com/advisories/11139/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200411-0173",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "propack",
"scope": "eq",
"trust": 2.1,
"vendor": "sgi",
"version": "2.4"
},
{
"model": "propack",
"scope": "eq",
"trust": 2.1,
"vendor": "sgi",
"version": "2.3"
},
{
"model": "sg5",
"scope": "eq",
"trust": 1.9,
"vendor": "avaya",
"version": "4.4"
},
{
"model": "sg5",
"scope": "eq",
"trust": 1.9,
"vendor": "avaya",
"version": "4.3"
},
{
"model": "sg5",
"scope": "eq",
"trust": 1.9,
"vendor": "avaya",
"version": "4.2"
},
{
"model": "sg208",
"scope": "eq",
"trust": 1.9,
"vendor": "avaya",
"version": "4.4"
},
{
"model": "sg203",
"scope": "eq",
"trust": 1.9,
"vendor": "avaya",
"version": "4.31.29"
},
{
"model": "sg203",
"scope": "eq",
"trust": 1.9,
"vendor": "avaya",
"version": "4.4"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.8,
"vendor": "openssl",
"version": "0.9.6c"
},
{
"model": "gsx server",
"scope": "eq",
"trust": 1.3,
"vendor": "vmware",
"version": "2.5.1"
},
{
"model": "gsx server",
"scope": "eq",
"trust": 1.3,
"vendor": "vmware",
"version": "2.0"
},
{
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.9"
},
{
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.8"
},
{
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.7"
},
{
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7.2"
},
{
"model": "stonegate vpn client",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.2.4"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.2.1"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.2"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.1"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.9"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.8"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.7"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.6"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.5"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.4"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0.1"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7.2"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7.1"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.7"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.6.3"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.6.2"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.5.18"
},
{
"model": "stonegate",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "1.5.17"
},
{
"model": "stonebeat webcluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.5"
},
{
"model": "stonebeat webcluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"model": "stonebeat securitycluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.5"
},
{
"model": "stonebeat securitycluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"model": "servercluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.5.2"
},
{
"model": "servercluster",
"scope": "eq",
"trust": 1.3,
"vendor": "stonesoft",
"version": "2.5"
},
{
"model": "propack",
"scope": "eq",
"trust": 1.3,
"vendor": "sgi",
"version": "3.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "redhat",
"version": "8.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "redhat",
"version": "7.2"
},
{
"model": "openbsd",
"scope": "eq",
"trust": 1.3,
"vendor": "openbsd",
"version": "3.4"
},
{
"model": "openbsd",
"scope": "eq",
"trust": 1.3,
"vendor": "openbsd",
"version": "3.3"
},
{
"model": "imanager",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "2.0"
},
{
"model": "imanager",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "1.5"
},
{
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.7.1"
},
{
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.7"
},
{
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.6.2"
},
{
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.5.27"
},
{
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.5"
},
{
"model": "edirectory",
"scope": "eq",
"trust": 1.3,
"vendor": "novell",
"version": "8.0"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 1.3,
"vendor": "hp",
"version": "11.23"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 1.3,
"vendor": "hp",
"version": "11.11"
},
{
"model": "apache-based web server",
"scope": "eq",
"trust": 1.3,
"vendor": "hp",
"version": "2.0.43.04"
},
{
"model": "apache-based web server",
"scope": "eq",
"trust": 1.3,
"vendor": "hp",
"version": "2.0.43.00"
},
{
"model": "freebsd",
"scope": "eq",
"trust": 1.3,
"vendor": "freebsd",
"version": "5.2"
},
{
"model": "freebsd",
"scope": "eq",
"trust": 1.3,
"vendor": "freebsd",
"version": "5.1"
},
{
"model": "freebsd",
"scope": "eq",
"trust": 1.3,
"vendor": "freebsd",
"version": "4.9"
},
{
"model": "freebsd",
"scope": "eq",
"trust": 1.3,
"vendor": "freebsd",
"version": "4.8"
},
{
"model": "webns",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "7.10"
},
{
"model": "webns",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "6.10"
},
{
"model": "secure content accelerator",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "10000"
},
{
"model": "okena stormwatch",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "3.2"
},
{
"model": "firewall services module",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "1.1.3"
},
{
"model": "firewall services module",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "1.1.2"
},
{
"model": "css secure content accelerator",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "2.0"
},
{
"model": "css secure content accelerator",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "1.0"
},
{
"model": "ciscoworks common services",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "2.2"
},
{
"model": "ciscoworks common management foundation",
"scope": "eq",
"trust": 1.3,
"vendor": "cisco",
"version": "2.1"
},
{
"model": "sg200",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.31.29"
},
{
"model": "sg200",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "4.4"
},
{
"model": "converged communications server",
"scope": "eq",
"trust": 1.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.3.1"
},
{
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.3"
},
{
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2.4"
},
{
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2.3"
},
{
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2.2"
},
{
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2.1"
},
{
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "5.2"
},
{
"model": "webstar",
"scope": "eq",
"trust": 1.3,
"vendor": "4d",
"version": "4.0"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3.1"
},
{
"model": "vpn-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation"
},
{
"model": "access registrar",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "openserver",
"scope": "eq",
"trust": 1.0,
"vendor": "sco",
"version": "5.0.6"
},
{
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.0.03"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(3.100\\)"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(1\\)"
},
{
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp0"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sy"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3\\(1\\)"
},
{
"model": "provider-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "4.1"
},
{
"model": "s8500",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.0"
},
{
"model": "freebsd",
"scope": "eq",
"trust": 1.0,
"vendor": "freebsd",
"version": "5.2.1"
},
{
"model": "sg208",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "*"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3_rc1"
},
{
"model": "css11000 content services switch",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "2.5"
},
{
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "2.0"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3_rc3"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(1\\)"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(3\\)"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.1"
},
{
"model": "gss 4490 global site selector",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "edirectory",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "8.5.12a"
},
{
"model": "enterprise",
"scope": "eq",
"trust": 1.0,
"vendor": "tarantella",
"version": "3.30"
},
{
"model": "content services switch 11500",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.3"
},
{
"model": "call manager",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2"
},
{
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.0.02"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(4\\)"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(2\\)"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3_rc2"
},
{
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.0.04"
},
{
"model": "intuity audix",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "*"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3\\(3.109\\)"
},
{
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.1_0.2.06"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "10.3.3"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6f"
},
{
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.10_.0.06s"
},
{
"model": "gsx server",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "2.5.1_build_5336"
},
{
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.0.01"
},
{
"model": "vpn-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp0"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "0.9.6b-3"
},
{
"model": "gss 4480 global site selector",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11b\\)e12"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.2_rc2"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(4.101\\)"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6h"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6d"
},
{
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.1"
},
{
"model": "threat response",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(5\\)"
},
{
"model": "wbem",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "a.02.00.00"
},
{
"model": "wbem",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "a.02.00.01"
},
{
"model": "proxysg",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "*"
},
{
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp1"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.2.1"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6i"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(3\\)"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.3"
},
{
"model": "intuity audix",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "s3400"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.2"
},
{
"model": "intuity audix",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "s3210"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.0.3"
},
{
"model": "cacheos ca sa",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "4.1.12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2za"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2.2_.111"
},
{
"model": "s8700",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.0"
},
{
"model": "aaa server",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "*"
},
{
"model": "enterprise",
"scope": "eq",
"trust": 1.0,
"vendor": "tarantella",
"version": "3.40"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0\\(2\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sy1"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "10.3.3"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.1.1"
},
{
"model": "crypto accelerator 4000",
"scope": "eq",
"trust": 1.0,
"vendor": "sun",
"version": "1.0"
},
{
"model": "s8500",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.1"
},
{
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "*"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11b\\)e14"
},
{
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "100_r2.0.1"
},
{
"model": "mds 9000",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.0"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "3.0"
},
{
"model": "clientless vpn gateway 4400",
"scope": "eq",
"trust": 1.0,
"vendor": "symantec",
"version": "5.0"
},
{
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "5"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(1\\)"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(2\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(13\\)e9"
},
{
"model": "intuity audix",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "5.1.46"
},
{
"model": "vpn-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "vsx_ng_with_application_intelligence"
},
{
"model": "vpn-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp1"
},
{
"model": "firewall services module",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6k"
},
{
"model": "gsx server",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "3.0_build_7592"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1\\(4\\)"
},
{
"model": "firewall services module",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "1.1_\\(3.005\\)"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "11.00"
},
{
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "5000_r2.0.1"
},
{
"model": "enterprise",
"scope": "eq",
"trust": 1.0,
"vendor": "tarantella",
"version": "3.20"
},
{
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "3.0"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6g"
},
{
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "2.0"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "8.05"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.3.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11b\\)e"
},
{
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2.1.02"
},
{
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "7500_r2.0.1"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.7b"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "0.9.6-15"
},
{
"model": "s8300",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.0"
},
{
"model": "sidewinder",
"scope": "eq",
"trust": 1.0,
"vendor": "securecomputing",
"version": "5.2"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.0"
},
{
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "2000_r2.0.1"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.2_rc1"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3\\(3.102\\)"
},
{
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.10_b4"
},
{
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "500"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 1.0,
"vendor": "neoteris",
"version": "3.0"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.6j"
},
{
"model": "cacheos ca sa",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "4.1.10"
},
{
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.1_0.1.02"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.0.1"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.0.2"
},
{
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "5x"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "3.0"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.2.2"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "0.9.7a-2"
},
{
"model": "application and content networking software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "*"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.3\\(2\\)"
},
{
"model": "webns",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "7.2_0.0.03"
},
{
"model": "vsu",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "10000_r2.0.1"
},
{
"model": "wbem",
"scope": "eq",
"trust": 1.0,
"vendor": "hp",
"version": "a.01.05.08"
},
{
"model": "s8700",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.1"
},
{
"model": "openserver",
"scope": "eq",
"trust": 1.0,
"vendor": "sco",
"version": "5.0.7"
},
{
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "1_2.0"
},
{
"model": "firewall-1",
"scope": "eq",
"trust": 1.0,
"vendor": "checkpoint",
"version": "next_generation_fp2"
},
{
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.1"
},
{
"model": "gsx server",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "2.0.1_build_2129"
},
{
"model": "stonebeat fullcluster",
"scope": "eq",
"trust": 1.0,
"vendor": "stonesoft",
"version": "1_3.0"
},
{
"model": "s8300",
"scope": "eq",
"trust": 1.0,
"vendor": "avaya",
"version": "r2.0.1"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.2\\(3\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(19\\)e1"
},
{
"model": "bsafe ssl-j",
"scope": "eq",
"trust": 1.0,
"vendor": "dell",
"version": "3.0.1"
},
{
"model": "pix firewall software",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "6.1"
},
{
"model": "speed technologies litespeed web server",
"scope": "eq",
"trust": 1.0,
"vendor": "lite",
"version": "1.1"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.7c"
},
{
"model": "openssl",
"scope": "eq",
"trust": 1.0,
"vendor": "openssl",
"version": "0.9.7a"
},
{
"model": "firewall services module",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "2.1_\\(0.208\\)"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2sy"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11\\)e"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "debian",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "gentoo linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "guardian digital",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "netscreen",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "openssl",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": "openssl",
"scope": "eq",
"trust": 0.8,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "openssl",
"scope": "eq",
"trust": 0.8,
"vendor": "openssl",
"version": "0.9.6a"
},
{
"model": "openssl",
"scope": "eq",
"trust": 0.8,
"vendor": "openssl",
"version": "0.9.6b"
},
{
"model": "vine linux",
"scope": "eq",
"trust": 0.8,
"vendor": "vine linux",
"version": "2.5"
},
{
"model": "vine linux",
"scope": "eq",
"trust": 0.8,
"vendor": "vine linux",
"version": "2.6"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.1"
},
{
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "1000 v1.0"
},
{
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "1000 v1.1"
},
{
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "4000 v1.0"
},
{
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "500"
},
{
"model": "netscreen idp",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "2.0 - 2.1r6"
},
{
"model": "netscreen ive",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "turbolinux advanced server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "6"
},
{
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "1.0 (hosting)"
},
{
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "1.0 (workgroup)"
},
{
"model": "turbolinux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10"
},
{
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "6.1"
},
{
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "6.5"
},
{
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "7"
},
{
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "8"
},
{
"model": "turbolinux workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "6.0"
},
{
"model": "turbolinux workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "7"
},
{
"model": "turbolinux workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "8"
},
{
"model": "firewall-1 gx",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "v2.0"
},
{
"model": "provider-1",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "ng and later"
},
{
"model": "vpn-1/firewall-1",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "ng and later"
},
{
"model": "vpn-1/firewall-1",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "vsx ng with application intelligence"
},
{
"model": "trendmicro interscan viruswall",
"scope": "eq",
"trust": 0.8,
"vendor": "trend micro",
"version": "3.81"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.00"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.11"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.23"
},
{
"model": "hp-ux aaa server",
"scope": "lte",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "a.06.01.02.04"
},
{
"model": "hp-ux aaa server",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "a.06.01.02.06"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (ws)"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "9"
},
{
"model": "ipcom series",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "( for details"
},
{
"model": "ipcom series",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "check the information provided by the vendor. )"
},
{
"model": "netshelter series",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "( for details"
},
{
"model": "netshelter series",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "check the information provided by the vendor. )"
},
{
"model": "netwatcher",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "( sensor device )"
},
{
"model": "primergy sslaccelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "7110"
},
{
"model": "primergy sslaccelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "7115"
},
{
"model": "primergy sslaccelerator",
"scope": "eq",
"trust": 0.8,
"vendor": "fujitsu",
"version": "7117"
},
{
"model": "ios 12.1 e",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "sg208",
"scope": null,
"trust": 0.6,
"vendor": "avaya",
"version": null
},
{
"model": "gsx server build",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.07592"
},
{
"model": "gsx server build",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.15336"
},
{
"model": "gsx server build",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.0.12129"
},
{
"model": "enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "tarantella",
"version": "33.40"
},
{
"model": "enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "tarantella",
"version": "33.30"
},
{
"model": "enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "tarantella",
"version": "33.200"
},
{
"model": "clientless vpn gateway series",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "44005.0"
},
{
"model": "crypto accelerator",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "40001.0"
},
{
"model": "stonebeat fullcluster for raptor",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.5"
},
{
"model": "stonebeat fullcluster for raptor",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"model": "stonebeat fullcluster for isa server",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "3.0"
},
{
"model": "stonebeat fullcluster for gauntlet",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"model": "stonebeat fullcluster for firewall-1",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "3.0"
},
{
"model": "stonebeat fullcluster for firewall-1",
"scope": "eq",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.0"
},
{
"model": "propack sp6",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "3.0"
},
{
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.24"
},
{
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.23"
},
{
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.22"
},
{
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.21"
},
{
"model": "irix f",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.21"
},
{
"model": "irix m",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.20"
},
{
"model": "irix f",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "6.5.20"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1.02"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.04"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.03"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.02"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.0.01"
},
{
"model": "computing sidewinder",
"scope": "eq",
"trust": 0.3,
"vendor": "secure",
"version": "5.2"
},
{
"model": "unixware",
"scope": "eq",
"trust": 0.3,
"vendor": "sco",
"version": "7.1.3"
},
{
"model": "unixware",
"scope": "eq",
"trust": 0.3,
"vendor": "sco",
"version": "7.1.1"
},
{
"model": "open server",
"scope": "eq",
"trust": 0.3,
"vendor": "sco",
"version": "5.0.7"
},
{
"model": "open server",
"scope": "eq",
"trust": 0.3,
"vendor": "sco",
"version": "5.0.6"
},
{
"model": "security bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.1"
},
{
"model": "security bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.0.1"
},
{
"model": "security bsafe ssl-j sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "rsa",
"version": "3.0"
},
{
"model": "openssl096b-0.9.6b-3.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"model": "openssl096-0.9.6-15.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"model": "openssl-perl-0.9.7a-2.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"model": "openssl-devel-0.9.7a-2.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"model": "openssl-0.9.7a-2.i386.rpm",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4.0"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3.0"
},
{
"model": "hat fedora core3",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"model": "hat fedora core2",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"model": "hat fedora core1",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "4"
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "3"
},
{
"model": "project openssl c",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "project openssl beta3",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "project openssl beta2",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "project openssl beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "project openssl b",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "project openssl a",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "project openssl",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "project openssl k",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl j",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl i",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl h",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl g",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl f",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl e",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl d",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "project openssl c",
"scope": "eq",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "edirectory su1",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "8.7.1"
},
{
"model": "edirectory a",
"scope": "eq",
"trust": 0.3,
"vendor": "novell",
"version": "8.5.12"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.3.1"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.3"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.2"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.1"
},
{
"model": "instant virtual extranet",
"scope": "eq",
"trust": 0.3,
"vendor": "netscreen",
"version": "3.0"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3.1"
},
{
"model": "litespeed web server rc3",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3"
},
{
"model": "litespeed web server rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3"
},
{
"model": "litespeed web server rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.2.2"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.2.1"
},
{
"model": "litespeed web server rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.2"
},
{
"model": "litespeed web server rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.2"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.1.1"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.1"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.0.3"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.0.2"
},
{
"model": "litespeed web server",
"scope": "eq",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.0.1"
},
{
"model": "wbem a.02.00.01",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "wbem a.02.00.00",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "wbem a.01.05.08",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "11.0"
},
{
"model": "hp-ux",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "8.5"
},
{
"model": "aaa server",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"model": "-release",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "5.2"
},
{
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "5.1"
},
{
"model": "-release",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "5.1"
},
{
"model": "-releng",
"scope": "eq",
"trust": 0.3,
"vendor": "freebsd",
"version": "4.8"
},
{
"model": "associates etrust security command center",
"scope": "eq",
"trust": 0.3,
"vendor": "computer",
"version": "1.0"
},
{
"model": "secure gateway for solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "1.13"
},
{
"model": "secure gateway for solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "1.12"
},
{
"model": "secure gateway for solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "citrix",
"version": "1.1"
},
{
"model": "webns .0.06s",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.10"
},
{
"model": "webns",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.20.0.03"
},
{
"model": "webns",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.10.2.06"
},
{
"model": "webns",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "7.10.1.02"
},
{
"model": "webns b4",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.10"
},
{
"model": "threat response",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3.2"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3.1"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3(3.109)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3(3.102)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3(1)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.3"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2.3"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2.2.111"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2.2"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2.1"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2(3.100)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2(3)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2(2)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2(1)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.2"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.5"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.4"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1.3"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(5)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(4)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(3)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(2)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1(1)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.1"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0.4"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0.3"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0(4.101)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0(4)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0(2)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0(1)"
},
{
"model": "pix firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6.0"
},
{
"model": "mds",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9000"
},
{
"model": "ios 12.2za",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.2sy",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.2 sy1",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.2 sy",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.1 e1",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.1 e9",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.1 e14",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.1 e12",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.1 ec",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ios 12.1 ea1",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "gss global site selector",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "44900"
},
{
"model": "gss global site selector",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4480"
},
{
"model": "firewall services module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "2.1(0.208)"
},
{
"model": "firewall services module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "1.1(3.005)"
},
{
"model": "firewall services module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "css11500 content services switch",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "css11000 content services switch",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "call manager",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "application \u0026 content networking software",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "access registrar",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "point software vpn-1 vsx ng with application intelligence",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"model": "point software vpn-1 next generation fp2",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"model": "point software vpn-1 next generation fp1",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"model": "point software vpn-1 next generation fp0",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"model": "point software providor-1 sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software providor-1 sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software providor-1 sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software providor-1 sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software providor-1",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1 vsx ng with application intelligence",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"model": "point software firewall-1 next generation fp2",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"model": "point software firewall-1 next generation fp1",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"model": "point software firewall-1 next generation fp0",
"scope": null,
"trust": 0.3,
"vendor": "check",
"version": null
},
{
"model": "point software firewall-1 gx",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "2.0"
},
{
"model": "coat systems proxysg",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "0"
},
{
"model": "coat systems cacheos ca/sa",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "4.1.12"
},
{
"model": "coat systems cacheos ca/sa",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "4.1.10"
},
{
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7500"
},
{
"model": "vsu",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5x0"
},
{
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5000"
},
{
"model": "vsu",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5000"
},
{
"model": "vsu",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "50"
},
{
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2000"
},
{
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "10000"
},
{
"model": "vsu r2.0.1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "100"
},
{
"model": "sg5x",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.4"
},
{
"model": "sg5x",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.3"
},
{
"model": "sg5x",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2"
},
{
"model": "sg208",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "0"
},
{
"model": "s8700 r2.0.1",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "s8700 r2.0.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "s8500 r2.0.1",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "s8500 r2.0.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "s8300 r2.0.1",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "s8300 r2.0.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "intuity r5 r5.1.46",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "intuity audix r5",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "0"
},
{
"model": "intuity s3400",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "intuity s3210",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "intuity lx",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"model": "gsx server",
"scope": "ne",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.2"
},
{
"model": "stonegate sparc",
"scope": "ne",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.2.12"
},
{
"model": "stonegate",
"scope": "ne",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.2.5x86"
},
{
"model": "stonegate ibm zseries",
"scope": "ne",
"trust": 0.3,
"vendor": "stonesoft",
"version": "2.2.5"
},
{
"model": "computing sidewinder",
"scope": "ne",
"trust": 0.3,
"vendor": "secure",
"version": "5.2.1.10"
},
{
"model": "security bsafe ssl-j sdk",
"scope": "ne",
"trust": 0.3,
"vendor": "rsa",
"version": "4.1"
},
{
"model": "project openssl d",
"scope": "ne",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.7"
},
{
"model": "project openssl m",
"scope": "ne",
"trust": 0.3,
"vendor": "openssl",
"version": "0.9.6"
},
{
"model": "litespeed web server",
"scope": "ne",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.3.2"
},
{
"model": "litespeed web server",
"scope": "ne",
"trust": 0.3,
"vendor": "lite speed",
"version": "1.0.2"
},
{
"model": "secure gateway for solaris",
"scope": "ne",
"trust": 0.3,
"vendor": "citrix",
"version": "1.14"
},
{
"model": "threat response",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "2.0.3"
},
{
"model": "mds",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "90002.0(0.86)"
},
{
"model": "mds",
"scope": "ne",
"trust": 0.3,
"vendor": "cisco",
"version": "90001.3(3.33)"
},
{
"model": "point software vpn-1 sp6",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software vpn-1 sp5a",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software vpn-1 sp5",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software vpn-1 sp4",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software vpn-1 sp3",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software vpn-1 sp2",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software vpn-1 sp1",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software vpn-1",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1 sp6",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1 sp5a",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1 sp5",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1 sp4",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1 sp3",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1 sp2",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1 sp1",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "point software firewall-1",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "4.1"
},
{
"model": "webstar",
"scope": "ne",
"trust": 0.3,
"vendor": "4d",
"version": "5.3.2"
},
{
"model": "oneworld xe/erp8 applications sp22",
"scope": null,
"trust": 0.3,
"vendor": "peoplesoft",
"version": null
},
{
"model": "enterpriseone applications",
"scope": "eq",
"trust": 0.3,
"vendor": "peoplesoft",
"version": "8.93"
},
{
"model": "enterpriseone applications sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "peoplesoft",
"version": "8.9"
},
{
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.6"
},
{
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.0.5"
},
{
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4"
},
{
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.5"
},
{
"model": "oracle9i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.4"
},
{
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.6"
},
{
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.0.5"
},
{
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4"
},
{
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.5"
},
{
"model": "oracle9i personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.4"
},
{
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.6.0"
},
{
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.2.0.5"
},
{
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4"
},
{
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.5"
},
{
"model": "oracle9i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.1.4"
},
{
"model": "oracle9i application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.3.1"
},
{
"model": "oracle9i application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.2.3"
},
{
"model": "oracle9i application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "1.0.2.2"
},
{
"model": "oracle8i standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.1.7.4"
},
{
"model": "oracle8i enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "8.1.7.4.0"
},
{
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.4"
},
{
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3.1"
},
{
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3"
},
{
"model": "oracle10g standard edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.2"
},
{
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.4"
},
{
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3.1"
},
{
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3"
},
{
"model": "oracle10g personal edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.2"
},
{
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.4"
},
{
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3.1"
},
{
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3"
},
{
"model": "oracle10g enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.2"
},
{
"model": "oracle10g application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.2"
},
{
"model": "oracle10g application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.3.1"
},
{
"model": "oracle10g application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4.1"
},
{
"model": "oracle10g application server",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4.0"
},
{
"model": "enterprise manager grid control 10g",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.3"
},
{
"model": "enterprise manager grid control 10g",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "10.1.0.2"
},
{
"model": "enterprise manager",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4.1"
},
{
"model": "enterprise manager",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "9.0.4.0"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.10"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.9"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.8"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.7"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.6"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.5"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.4"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.3"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.2"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5.1"
},
{
"model": "e-business suite 11i",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.5"
},
{
"model": "e-business suite",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "11.0"
},
{
"model": "collaboration suite release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "29.0.4.2"
},
{
"model": "collaboration suite release",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "29.0.4.1"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#465542"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-078"
},
{
"db": "NVD",
"id": "CVE-2004-0081"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:openssl:openssl",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:sgi:propack",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:vine_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:sun:sun_crypto_accelerator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:juniper:netscreen-idp",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:juniper:netscreen-ive",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_appliance_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:checkpoint:firewall-1_gx",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:checkpoint:provider-1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:checkpoint:vpn-1_firewall-1",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:trendmicro:interscan_viruswall",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:hp:hp-ux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hp:aaa_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:ipcom",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:netshelter",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:netwatcher",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:primergy_ssl_accelerator",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000087"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "David Litchfield\u203b david@nextgenss.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200411-078"
}
],
"trust": 0.6
},
"cve": "CVE-2004-0081",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2004-0081",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-8511",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2004-0081",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#465542",
"trust": 0.8,
"value": "5.16"
},
{
"author": "NVD",
"id": "CVE-2004-0081",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-200411-078",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-8511",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#465542"
},
{
"db": "VULHUB",
"id": "VHN-8511"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-078"
},
{
"db": "NVD",
"id": "CVE-2004-0081"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. This vulnerability was addressed in OpenSSL 0.9.6d and 0.9.7. The vulnerability is OpenSSL Applications and systems that use the library may also be affected. For more detailed information about other systems NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please check also.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. \nFor the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. \nThe second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. \nThis entry will be retired when individual BID records are created for each issue. \n*Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. \nOracle has released a Critical Patch Update to address these issues in various supported applications and platforms. \nThe issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. \nThis BID will be divided and updated into separate BIDs when more information is available. An attacker could exploit these vulnerabilities to take complete control of an affected database. \n\nTITLE:\nFedora update for openssl096b\n\nSECUNIA ADVISORY ID:\nSA17381\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/17381/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nFedora Core 3\nhttp://secunia.com/product/4222/\n\nDESCRIPTION:\nFedora has issued an update for openssl096b. This fixes some\nvulnerabilities, which can be exploited by malicious people to cause\na DoS (Denial of Service). \n\nFor more information:\nSA10133\nSA11139\n\nSOLUTION:\nApply updated packages. \n\nFedora Core 3:\nhttp://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/\n\n8d68e4b430aa7c5ca067c12866ae694e\nSRPMS/openssl096b-0.9.6b-21.42.src.rpm\n54a9e78a2fdd625b9dc9121e09eb4398\nx86_64/openssl096b-0.9.6b-21.42.x86_64.rpm\nc5c6174e23eba8d038889d08f49231b8\nx86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm\n56b63fc150d0c099b2e4f0950e21005b\nx86_64/openssl096b-0.9.6b-21.42.i386.rpm\n56b63fc150d0c099b2e4f0950e21005b\ni386/openssl096b-0.9.6b-21.42.i386.rpm\n93195495585c7e9789041c75b1ed5380\ni386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm\n\nOTHER REFERENCES:\nSA10133:\nhttp://secunia.com/advisories/10133/\n\nSA11139:\nhttp://secunia.com/advisories/11139/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0081"
},
{
"db": "CERT/CC",
"id": "VU#465542"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "VULHUB",
"id": "VHN-8511"
},
{
"db": "PACKETSTORM",
"id": "41200"
},
{
"db": "PACKETSTORM",
"id": "41105"
}
],
"trust": 3.15
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#465542",
"trust": 3.3
},
{
"db": "NVD",
"id": "CVE-2004-0081",
"trust": 3.1
},
{
"db": "BID",
"id": "9899",
"trust": 2.8
},
{
"db": "USCERT",
"id": "TA04-078A",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "11139",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1009458",
"trust": 0.8
},
{
"db": "XF",
"id": "15509",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000087",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200411-078",
"trust": 0.7
},
{
"db": "BID",
"id": "13139",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-8511",
"trust": 0.1
},
{
"db": "SECUNIA",
"id": "17398",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "41200",
"trust": 0.1
},
{
"db": "SECUNIA",
"id": "17381",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "41105",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#465542"
},
{
"db": "VULHUB",
"id": "VHN-8511"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"db": "PACKETSTORM",
"id": "41200"
},
{
"db": "PACKETSTORM",
"id": "41105"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-078"
},
{
"db": "NVD",
"id": "CVE-2004-0081"
}
]
},
"id": "VAR-200411-0173",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-8511"
}
],
"trust": 0.52271296
},
"last_update_date": "2025-04-03T21:32:55.582000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "OpenSSL Vulnerability",
"trust": 0.8,
"url": "http://www.checkpoint.com/services/techsupport/alerts/openssl.html"
},
{
"title": "HPSBUX01011",
"trust": 0.8,
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00897351"
},
{
"title": "HPSBUX01011",
"trust": 0.8,
"url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX01011.html"
},
{
"title": "NetScreen Advisory 58466",
"trust": 0.8,
"url": "http://www.juniper.net/support/security/alerts/adv58466-2.txt"
},
{
"title": "openssl096",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/update/list.php?errata_id=155"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.openssl.org/"
},
{
"title": "RHSA-2004:119",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2004-119.html"
},
{
"title": "RHSA-2004:121",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2004-121.html"
},
{
"title": "RHSA-2004:120",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2004-120.html"
},
{
"title": "20040304-01-U",
"trust": 0.8,
"url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc"
},
{
"title": "57571",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-1"
},
{
"title": "57524",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-1"
},
{
"title": "57571",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-3"
},
{
"title": "57524",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-3"
},
{
"title": "19387",
"trust": 0.8,
"url": "http://kb.trendmicro.com/solutions/solutionDetail.asp?solutionID=19387"
},
{
"title": "TLSA-2004-9",
"trust": 0.8,
"url": "http://www.turbolinux.com/security/2004/TLSA-2004-9.txt"
},
{
"title": "OpenSSL \u306b\u95a2\u3059\u308b\u8106\u5f31\u6027",
"trust": 0.8,
"url": "http://www.checkpoint.co.jp/techsupport/alerts/openssl.html"
},
{
"title": "RHSA-2004:120",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2004-120J.html"
},
{
"title": "RHSA-2004:119",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2004-119J.html"
},
{
"title": "openssl \u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30db\u30fc\u30eb",
"trust": 0.8,
"url": "http://vinelinux.org/errata/25x/20040319-1.html"
},
{
"title": "TLSA-2004-9",
"trust": 0.8,
"url": "http://www.turbolinux.co.jp/security/2004/TLSA-2004-9j.txt"
},
{
"title": "IPCOM\u30b7\u30ea\u30fc\u30ba\u306eOpenSSL\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://primeserver.fujitsu.com/ipcom/support/security20040325/"
},
{
"title": "[\u91cd\u8981] OpenSSL\u8106\u5f31\u6027\u3078\u306e\u5bfe\u5fdc\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://jp.fujitsu.com/support/security/backnumber/2004/0325/"
},
{
"title": "224012",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/cert/niscc.html#224012-OpenSSL"
},
{
"title": "OpenSSL Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=169015"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-078"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0081"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm"
},
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/9899"
},
{
"trust": 2.5,
"url": "http://www.us-cert.gov/cas/techalerts/ta04-078a.html"
},
{
"trust": 2.5,
"url": "http://www.kb.cert.org/vuls/id/465542"
},
{
"trust": 2.3,
"url": "http://rhn.redhat.com/errata/rhsa-2004-119.html"
},
{
"trust": 2.0,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2004/dsa-465"
},
{
"trust": 1.7,
"url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html"
},
{
"trust": 1.7,
"url": "http://fedoranews.org/updates/fedora-2004-095.shtml"
},
{
"trust": 1.7,
"url": "http://security.gentoo.org/glsa/glsa-200403-03.xml"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11755"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a871"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a902"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2004-120.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2004-121.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2004-139.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/11139"
},
{
"trust": 1.7,
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524"
},
{
"trust": 1.7,
"url": "http://www.trustix.org/errata/2004/0012"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15509"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=107955049331965\u0026w=2"
},
{
"trust": 1.6,
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834"
},
{
"trust": 1.6,
"url": "http://marc.info/?l=bugtraq\u0026m=108403850228012\u0026w=2"
},
{
"trust": 1.1,
"url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.10/scosa-2004.10.txt"
},
{
"trust": 1.1,
"url": "ftp://patches.sgi.com/support/free/security/advisories/20040304-01-u.asc"
},
{
"trust": 0.8,
"url": "http://www.openssl.org"
},
{
"trust": 0.8,
"url": "http://cvs.openssl.org/chngview?cn=5721"
},
{
"trust": 0.8,
"url": "http://cvs.openssl.org/chngview?cn=5722"
},
{
"trust": 0.8,
"url": "http://cvs.openssl.org/getfile?v=1.618.2.137\u0026f=openssl/changes"
},
{
"trust": 0.8,
"url": "http://cvs.openssl.org/getfile?v=1.954\u0026f=openssl/changes"
},
{
"trust": 0.8,
"url": "http://www.ciac.org/ciac/bulletins/o-101.shtml"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0081"
},
{
"trust": 0.8,
"url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20040317-00389.xml"
},
{
"trust": 0.8,
"url": "http://xforce.iss.net/xforce/xfdb/15509"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/wr/2004/wr041201.txt"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/wr/2004/wr041301.txt"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/wr/2004/wr041701.txt"
},
{
"trust": 0.8,
"url": "http://www.jpcert.or.jp/wr/2004/wr041801.txt"
},
{
"trust": 0.8,
"url": "http://jvn.jp/niscc/niscc-224012"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta04-078a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta04-078a"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0081"
},
{
"trust": 0.8,
"url": "http://www.cpni.gov.uk/docs/re-20040317-00389.pdf?lang=en"
},
{
"trust": 0.8,
"url": "http://www.securitytracker.com/alerts/2004/mar/1009458.html"
},
{
"trust": 0.8,
"url": "http://www.cyberpolice.go.jp/important/20040318_082932.html"
},
{
"trust": 0.6,
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57524"
},
{
"trust": 0.3,
"url": "http://www.4d.com/products/4dwsv.html"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/japple/css/japple?page=avaya.css.openpage\u0026temp.template.name=securityadvisory"
},
{
"trust": 0.3,
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000827"
},
{
"trust": 0.3,
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000834"
},
{
"trust": 0.3,
"url": "ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf1-readme.txt"
},
{
"trust": 0.3,
"url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1256"
},
{
"trust": 0.3,
"url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1257"
},
{
"trust": 0.3,
"url": "http://www.netscreen.com/services/security/alerts/adv58466-signed.txt"
},
{
"trust": 0.3,
"url": "http://www.stonesoft.com/document/art/3123.html"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/elmodocs2/security/asa-2005-239.htm"
},
{
"trust": 0.3,
"url": "http://www.checkpoint.com/techsupport/alerts/openssl.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2004-120.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2004-139.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2005-830.html"
},
{
"trust": 0.3,
"url": "http://www.bluecoat.com/support/knowledge/advisory_openssl_can-2004-0079.html"
},
{
"trust": 0.3,
"url": "http://www.apple.com/support/downloads/securityupdate_2004-04-05_(10_3_3).html"
},
{
"trust": 0.3,
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm"
},
{
"trust": 0.3,
"url": "http://www.securecomputing.com/pdf/52110relnotes.pdf"
},
{
"trust": 0.3,
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57571"
},
{
"trust": 0.3,
"url": "http://www.tarantella.com/security/bulletin-10.html"
},
{
"trust": 0.3,
"url": "http://www.adiscon.com/common/en/advisory/2004-03-18.asp"
},
{
"trust": 0.3,
"url": "http://www.uniras.gov.uk/l1/l2/l3/alerts2004/alert-1204.txt"
},
{
"trust": 0.3,
"url": "http://www.litespeedtech.com"
},
{
"trust": 0.3,
"url": "/archive/1/357672"
},
{
"trust": 0.3,
"url": "http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf"
},
{
"trust": 0.3,
"url": "http://www.oracle.com/index.html"
},
{
"trust": 0.3,
"url": "http://www.peoplesoft.com:80/corp/en/support/security_index.jsp"
},
{
"trust": 0.3,
"url": "/archive/1/395699"
},
{
"trust": 0.2,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.2,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.2,
"url": "http://secunia.com/advisories/11139/"
},
{
"trust": 0.2,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=107955049331965\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=108403850228012\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000834"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/48/"
},
{
"trust": 0.1,
"url": "http://rhn.redhat.com/errata/rhsa-2005-829.html"
},
{
"trust": 0.1,
"url": "http://rhn.redhat.com/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/1326/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/1306/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/17398/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/1044/"
},
{
"trust": 0.1,
"url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/4222/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/17381/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/10133/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#465542"
},
{
"db": "VULHUB",
"id": "VHN-8511"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"db": "PACKETSTORM",
"id": "41200"
},
{
"db": "PACKETSTORM",
"id": "41105"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-078"
},
{
"db": "NVD",
"id": "CVE-2004-0081"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#465542"
},
{
"db": "VULHUB",
"id": "VHN-8511"
},
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "13139"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"db": "PACKETSTORM",
"id": "41200"
},
{
"db": "PACKETSTORM",
"id": "41105"
},
{
"db": "CNNVD",
"id": "CNNVD-200411-078"
},
{
"db": "NVD",
"id": "CVE-2004-0081"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-03-17T00:00:00",
"db": "CERT/CC",
"id": "VU#465542"
},
{
"date": "2004-11-23T00:00:00",
"db": "VULHUB",
"id": "VHN-8511"
},
{
"date": "2004-03-17T00:00:00",
"db": "BID",
"id": "9899"
},
{
"date": "2005-04-12T00:00:00",
"db": "BID",
"id": "13139"
},
{
"date": "2007-04-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"date": "2005-11-03T01:02:14",
"db": "PACKETSTORM",
"id": "41200"
},
{
"date": "2005-11-02T01:11:22",
"db": "PACKETSTORM",
"id": "41105"
},
{
"date": "2003-07-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200411-078"
},
{
"date": "2004-11-23T05:00:00",
"db": "NVD",
"id": "CVE-2004-0081"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2005-05-06T00:00:00",
"db": "CERT/CC",
"id": "VU#465542"
},
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-8511"
},
{
"date": "2015-03-19T08:20:00",
"db": "BID",
"id": "9899"
},
{
"date": "2006-05-05T23:30:00",
"db": "BID",
"id": "13139"
},
{
"date": "2007-04-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2004-000087"
},
{
"date": "2021-11-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200411-078"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2004-0081"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "13139"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "OpenSSL does not properly handle unknown message types",
"sources": [
{
"db": "CERT/CC",
"id": "VU#465542"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "9899"
},
{
"db": "BID",
"id": "13139"
}
],
"trust": 0.6
}
}
JVNDB-2005-000601
Vulnerability from jvndb - Published: 2008-05-21 00:00 - Updated:2014-05-22 18:04| Vendor | Product | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000601.html",
"dc:date": "2014-05-22T18:04+09:00",
"dcterms:issued": "2008-05-21T00:00+09:00",
"dcterms:modified": "2014-05-22T18:04+09:00",
"description": "OpenSSL from OpenSSL Project contains a version rollback vulnerability. If a specific option is used on a server running OpenSSL, an attacker can force the client and the server to negotiate the SSL 2.0 protocol even if these parties both request TLS 1.0 protocol by crafting an attack on the communication path.\r\n\r\nRFC 2246, defining the TLS protocol, defines that when TLS 1.0 is available, SSL 2.0 should not be used in order to avoid version rollback attacks.",
"link": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000601.html",
"sec:cpe": [
{
"#text": "cpe:/a:hitachi:cosminexus_application_server_enterprise",
"@product": "Cosminexus Application Server Enterprise",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_application_server_standard",
"@product": "Cosminexus Application Server Standard",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_application_server_version_5",
"@product": "Cosminexus Application Server Version 5",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_developer_light_version_6",
"@product": "Cosminexus Developer Light Version 6",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_developer_professional_version_6",
"@product": "Cosminexus Developer Professional Version 6",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_developer_standard_version_6",
"@product": "Cosminexus Developer Standard Version 6",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_developer_version_5",
"@product": "Cosminexus Developer Version 5",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_server_-_enterprise_edition",
"@product": "Cosminexus Server - Enterprise Edition",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition",
"@product": "Cosminexus Server - Standard Edition",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_server_-_standard_edition_version_4",
"@product": "Cosminexus Server - Standard Edition Version 4",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition",
"@product": "Cosminexus Server - Web Edition",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:cosminexus_server_-_web_edition_version_4",
"@product": "Cosminexus Server - Web Edition Version 4",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:hitachi_web_server",
"@product": "Hitachi Web Server",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_enterprise",
"@product": "uCosminexus Application Server Enterprise",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_smart_edition",
"@product": "uCosminexus Application Server Smart Edition",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_application_server_standard",
"@product": "uCosminexus Application Server Standard",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer",
"@product": "uCosminexus Developer",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer_light",
"@product": "uCosminexus Developer Light",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_developer_standard",
"@product": "uCosminexus Developer Standard",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_service_architect",
"@product": "uCosminexus Service Architect",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:hitachi:ucosminexus_service_platform",
"@product": "uCosminexus Service Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/a:openssl:openssl",
"@product": "OpenSSL",
"@vendor": "OpenSSL Project",
"@version": "2.2"
},
{
"#text": "cpe:/a:trendmicro:interscan_messaging_security_suite",
"@product": "InterScan Messaging Security Suite",
"@vendor": "Trend Micro, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/a:trendmicro:interscan_viruswall",
"@product": "TrendMicro InterScan VirusWall",
"@vendor": "Trend Micro, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/a:trendmicro:interscan_web_security_suite",
"@product": "TrendMicro InterScan Web Security Suite",
"@vendor": "Trend Micro, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:fujitsu:fmse-c301",
"@product": "FMSE-C301",
"@vendor": "FUJITSU",
"@version": "2.2"
},
{
"#text": "cpe:/h:fujitsu:ipcom",
"@product": "IPCOM Series",
"@vendor": "FUJITSU",
"@version": "2.2"
},
{
"#text": "cpe:/o:hp:hp-ux",
"@product": "HP-UX",
"@vendor": "Hewlett-Packard Development Company,L.P",
"@version": "2.2"
},
{
"#text": "cpe:/o:misc:miraclelinux_asianux_server",
"@product": "Asianux Server",
"@vendor": "Cybertrust Japan Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:enterprise_linux",
"@product": "Red Hat Enterprise Linux",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:linux_advanced_workstation",
"@product": "Red Hat Linux Advanced Workstation",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:sun:solaris",
"@product": "Sun Solaris",
"@vendor": "Sun Microsystems, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_appliance_server",
"@product": "Turbolinux Appliance Server",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_fuji",
"@product": "Turbolinux FUJI",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_multimedia",
"@product": "Turbolinux Multimedia",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_personal",
"@product": "Turbolinux Personal",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_server",
"@product": "Turbolinux Server",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_wizpy",
"@product": "wizpy",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "2.6",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2005-000601",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN23632449/index.html",
"@id": "JVN#23632449",
"@source": "JVN"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969",
"@id": "CVE-2005-2969",
"@source": "CVE"
},
{
"#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2005-2969",
"@id": "CVE-2005-2969",
"@source": "NVD"
},
{
"#text": "http://secunia.com/advisories/17151/",
"@id": "SA17151",
"@source": "SECUNIA"
},
{
"#text": "http://www.securityfocus.com/bid/15071",
"@id": "15071",
"@source": "BID"
},
{
"#text": "http://www.securiteam.com/securitynews/6Y00D0AEBW.html",
"@id": "6Y00D0AEBW",
"@source": "SECTEAM"
},
{
"#text": "http://www.frsirt.com/english/advisories/2005/2036",
"@id": "FrSIRT/ADV-2005-2036",
"@source": "FRSIRT"
}
],
"title": "OpenSSL version rollback vulnerability"
}