Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-0960 (GCVE-0-2008-0960)
Vulnerability from cvelistv5 – Published: 2008-06-10 18:00 – Updated: 2024-08-07 08:01- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:01:40.150Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"name": "35463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35463"
},
{
"name": "30615",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30615"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "ADV-2008-1787",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"name": "30648",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30648"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
},
{
"name": "32664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32664"
},
{
"name": "ADV-2008-1981",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "ADV-2008-1801",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"name": "SUSE-SA:2008:039",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"name": "31351",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31351"
},
{
"name": "ADV-2008-1788",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
},
{
"name": "FEDORA-2008-5215",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
},
{
"name": "29623",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29623"
},
{
"name": "31334",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31334"
},
{
"name": "ADV-2008-2971",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"name": "oval:org.mitre.oval:def:10820",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
},
{
"name": "oval:org.mitre.oval:def:6414",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
},
{
"name": "30626",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30626"
},
{
"name": "SSRT080082",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
},
{
"name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"name": "HPSBMA02439",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"name": "VU#878044",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"name": "30647",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30647"
},
{
"name": "238865",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"name": "ADV-2008-1836",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"name": "33003",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33003"
},
{
"name": "20080610 SNMP Version 3 Authentication Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"name": "ADV-2008-2361",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"name": "31568",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31568"
},
{
"name": "31467",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31467"
},
{
"name": "APPLE-SA-2008-06-30",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "DSA-1663",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "TA08-162A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"name": "RHSA-2008:0528",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"name": "3933",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3933"
},
{
"name": "RHSA-2008:0529",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
},
{
"name": "30612",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30612"
},
{
"name": "30802",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30802"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
},
{
"name": "5790",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"name": "ADV-2008-1797",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"name": "GLSA-200808-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"name": "30665",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30665"
},
{
"name": "FEDORA-2008-5218",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
},
{
"name": "FEDORA-2008-5224",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
},
{
"name": "ADV-2008-1800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"name": "MDVSA-2008:118",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
},
{
"name": "USN-685-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"name": "1020218",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020218"
},
{
"name": "30596",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30596"
},
{
"name": "oval:org.mitre.oval:def:5785",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
},
{
"name": "ADV-2009-1612",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"name": "30574",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30574"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-06-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"name": "35463",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35463"
},
{
"name": "30615",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30615"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "ADV-2008-1787",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"name": "30648",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30648"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
},
{
"name": "32664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32664"
},
{
"name": "ADV-2008-1981",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "ADV-2008-1801",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"name": "SUSE-SA:2008:039",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"name": "31351",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31351"
},
{
"name": "ADV-2008-1788",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
},
{
"name": "FEDORA-2008-5215",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
},
{
"name": "29623",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29623"
},
{
"name": "31334",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31334"
},
{
"name": "ADV-2008-2971",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"name": "oval:org.mitre.oval:def:10820",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
},
{
"name": "oval:org.mitre.oval:def:6414",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
},
{
"name": "30626",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30626"
},
{
"name": "SSRT080082",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
},
{
"name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"name": "HPSBMA02439",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"name": "VU#878044",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"name": "30647",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30647"
},
{
"name": "238865",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"name": "ADV-2008-1836",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"name": "33003",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33003"
},
{
"name": "20080610 SNMP Version 3 Authentication Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"name": "ADV-2008-2361",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"name": "31568",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31568"
},
{
"name": "31467",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31467"
},
{
"name": "APPLE-SA-2008-06-30",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "DSA-1663",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "TA08-162A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"name": "RHSA-2008:0528",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"name": "3933",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3933"
},
{
"name": "RHSA-2008:0529",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
},
{
"name": "30612",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30612"
},
{
"name": "30802",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30802"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
},
{
"name": "5790",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"name": "ADV-2008-1797",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"name": "GLSA-200808-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"name": "30665",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30665"
},
{
"name": "FEDORA-2008-5218",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
},
{
"name": "FEDORA-2008-5224",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
},
{
"name": "ADV-2008-1800",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"name": "MDVSA-2008:118",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
},
{
"name": "USN-685-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"name": "1020218",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020218"
},
{
"name": "30596",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30596"
},
{
"name": "oval:org.mitre.oval:def:5785",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
},
{
"name": "ADV-2009-1612",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"name": "30574",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30574"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2008-0960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"name": "35463",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35463"
},
{
"name": "30615",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30615"
},
{
"name": "http://support.apple.com/kb/HT2163",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "ADV-2008-1787",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"name": "30648",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30648"
},
{
"name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
},
{
"name": "32664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32664"
},
{
"name": "ADV-2008-1981",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "ADV-2008-1801",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"name": "SUSE-SA:2008:039",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
"refsource": "MLIST",
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"name": "31351",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31351"
},
{
"name": "ADV-2008-1788",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
},
{
"name": "FEDORA-2008-5215",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
},
{
"name": "29623",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29623"
},
{
"name": "31334",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31334"
},
{
"name": "ADV-2008-2971",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"name": "oval:org.mitre.oval:def:10820",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
},
{
"name": "oval:org.mitre.oval:def:6414",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
},
{
"name": "30626",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30626"
},
{
"name": "SSRT080082",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
},
{
"name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"name": "HPSBMA02439",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"name": "VU#878044",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"name": "30647",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30647"
},
{
"name": "238865",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"name": "ADV-2008-1836",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"name": "33003",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33003"
},
{
"name": "20080610 SNMP Version 3 Authentication Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"name": "ADV-2008-2361",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"name": "31568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31568"
},
{
"name": "31467",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31467"
},
{
"name": "APPLE-SA-2008-06-30",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "DSA-1663",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "TA08-162A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-006.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"name": "RHSA-2008:0528",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"name": "3933",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3933"
},
{
"name": "RHSA-2008:0529",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
},
{
"name": "30612",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30612"
},
{
"name": "30802",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30802"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
},
{
"name": "5790",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"name": "ADV-2008-1797",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"name": "GLSA-200808-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"name": "30665",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30665"
},
{
"name": "FEDORA-2008-5218",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
},
{
"name": "FEDORA-2008-5224",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
},
{
"name": "ADV-2008-1800",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"name": "MDVSA-2008:118",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
},
{
"name": "USN-685-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=833770",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"name": "1020218",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020218"
},
{
"name": "30596",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30596"
},
{
"name": "oval:org.mitre.oval:def:5785",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
},
{
"name": "ADV-2009-1612",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"name": "30574",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30574"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2008-0960",
"datePublished": "2008-06-10T18:00:00",
"dateReserved": "2008-02-25T00:00:00",
"dateUpdated": "2024-08-07T08:01:40.150Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2008-0960\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2008-06-10T18:32:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n SNMPv3 HMAC en (1) Net-SNMP versi\u00f3n 5.2.x anterior a 5.2.4.1, versi\u00f3n 5.3.x anterior a 5.3.2.1 y versi\u00f3n 5.4.x anterior a 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series versi\u00f3n 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (tambi\u00e9n se conoce como Network Appliance) ONTAP versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versi\u00f3n anterior a 16.2; (7) m\u00faltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall versi\u00f3n 3.1.0 y posterior y SIParator versi\u00f3n 3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent versi\u00f3n 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticaci\u00f3n SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CAC7FBF-2493-42CA-9B23-20AF09F0DDA8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE64E4C4-BACE-404F-966D-415976781DC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"377F951F-C2D8-441D-A532-F62E23937F94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A3A284-36A9-4E8C-815D-6E2FE4C158DF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5823F33-7FB3-465B-8017-1866D9EF3AA6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*\",\"matchCriteriaId\":\"94870E9E-C883-4051-8854-CDE0AE7A64B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A4AFC06-85C5-4AD0-A409-27F9AF398D7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB593071-BB5A-47AD-B9C6-59D2010F6280\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*\",\"matchCriteriaId\":\"74382B2D-E9A6-453D-9C07-F959EAB4C075\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D93383-BD5A-4052-B724-055F6FCFC314\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1E3C39-163D-4A99-AC96-2EE388305000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*\",\"matchCriteriaId\":\"90710000-F963-4F36-9EE1-C3CE1CECDCA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F4F8B9E-B2AB-4545-8ACF-8F03E636E842\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E2D6402-D2AF-4817-8A46-1FA9B17B720C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BB5494-735D-424B-8B41-2FAECE1A7AD4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6178BC-9741-4FC1-87DA-A5407B3A4F40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A419BD7-6345-43D8-B69C-2255E2EF6FD7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*\",\"matchCriteriaId\":\"B472DEEE-148A-46B4-BCBC-0A9F62F38B31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*\",\"matchCriteriaId\":\"23305EBA-11D5-417E-823E-39D0D052839D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"95418AD2-FB85-4E20-B874-D82DDF88BC91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D1B81D-95E4-4945-94F2-C36FD7C0DC55\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*\",\"matchCriteriaId\":\"452FF154-F6C0-4BC4-969E-1D49AA3CCE49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB6C57C-8805-443F-8ACE-83DAA48878CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*\",\"matchCriteriaId\":\"554C9611-55F1-40AF-9862-7E902D5CE1D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*\",\"matchCriteriaId\":\"F89C185A-D3B3-4F5F-9249-F8EE89E8DD04\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB0B55E-3579-4929-862F-C5FF9F796AE1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8E34D3-0BCB-4D19-A41C-0375941E1B21\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*\",\"matchCriteriaId\":\"09CBD68E-2A5C-43DF-9AD6-DE07815821B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*\",\"matchCriteriaId\":\"01393D91-ED1D-460D-8621-10260F0CBDD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB2FF53-5991-4264-B5CC-D1E45460BFCE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE94EA2-E0CC-4760-94A8-DE56C8181F74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*\",\"matchCriteriaId\":\"929836AD-8128-4174-872D-B9638B54611C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED5B53D-930D-477E-A0F6-76167AE67641\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*\",\"matchCriteriaId\":\"84983F6A-64F6-4720-9291-FC84CA10EE25\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A60117-E4D1-4741-98A2-E643A26616A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*\",\"matchCriteriaId\":\"156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E90E83-1732-4BEF-BC5B-401769DC8880\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*\",\"matchCriteriaId\":\"51679B26-DF28-4E41-9801-E1599F250FFD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*\",\"matchCriteriaId\":\"E989900F-BE66-47E4-9A1B-11B9785F89BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A01B7E-8231-4001-A340-31CE66474FDA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC62D3B-A287-4DED-A44D-3351452D4A55\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*\",\"matchCriteriaId\":\"687E91FF-957E-449F-BDD6-85AA59E1E0D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79528F96-FD42-4A76-82EE-4B1324D53B5F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D626B494-6210-4F74-8D17-BA480B6665C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B6315D-7BEF-419F-9B93-3CF669E986D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB31FAC-D720-4BF1-BFCC-0A9B714E292A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904CA41E-8168-41DE-AE84-941962A7BB71\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D69F8FA-D58A-4F53-86D8-A20C73E9B299\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD331C50-DB93-4001-B56A-C1012F894CDF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75538529-611A-43B5-AC4D-089C4E2E2ACC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F992D03D-1DB8-44C1-B59D-1C09A32A2C91\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8BC298-4AF9-4281-9AD9-0D8F621E46B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2FE436B-2117-4FB4-B550-8454848D1D58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D2BD63-C110-4E89-B239-4A59E20AB78E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E5FFB6-861D-4F91-B3C9-C5E57DDD25C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD3BD3D-767D-483D-9FFE-D23AA2E228E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6762126F-55E4-4963-99F5-206A46979E7C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1945B97A-8276-4EE2-8F76-5F0C0956DF18\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8CA81F-2AB6-45F8-8AAE-BF6A7EDA73D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2452913-0513-46BB-A52E-8FA12D77B570\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D967624-23B1-48BB-91DB-1E1C18AAAD85\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18CCF3B9-CA7D-4D37-BD2C-1B74586B98A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0AB8C2-EE95-48AA-98B7-B6ED40494A0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77930529-89BE-463D-8259-3D67D153284A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"743DEB17-3BE3-4278-A54B-2CE547DB9F31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DCAF8C2-0E4E-4474-BD1E-F28A6EAEF8F8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2BCA127-F5F3-418F-890D-6B1C03019590\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5A2C2F-ABF4-46B0-80AB-867B97AE5237\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE83150C-456E-462A-A0F1-ED8EAD60D671\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF5B2431-335C-461B-B07F-88267EA71DCD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DBA8E67-021A-4D07-94B9-943A8E1C4468\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"905D1F04-CDFD-4BAD-8939-5ABC70A874E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00878E69-2721-43E3-A853-D3DCFE5C258D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C51799BB-D931-436C-8C94-558956AC880A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1ACC549-B5AF-4F5C-A3FE-257AA6D80C7A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D498D406-A453-4119-BBA1-4709CF5862AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D68555E-BEB9-4F1E-8D6D-C313FB501523\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B44A0D4-3020-414B-81D7-679E8441E182\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*\",\"matchCriteriaId\":\"B76A8BD4-E53F-49A6-946B-6E672DD0419C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C6B46B-13E2-4DA4-9EF2-007893034269\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1C501EB-CF9F-437D-A7C0-2A12F1D5E171\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"538FE81A-2FD9-4A7C-AEC7-8FCE98DADBE0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D3471D-6267-4481-8BBD-BFC106E8F30B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13FB3C8A-87D3-4601-BD97-2B9F9FA8CA47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0292228-80D8-4BA4-8662-698D7003D7D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFD21CF-CC38-477F-A78B-10CFEFF81E0A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522C9080-86A6-40A8-905C-73187DAF83F7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C1B7A18-F230-44D4-801E-8284085CA1DF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E62CC4C-89A7-4594-BDD8-394211889220\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E152F995-BCD2-4725-A47C-1A5E7D6B9005\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E38404-ED69-4B0E-A035-2AF5E0649CC1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90F0A06-A634-4BD0-A477-90BD3384B7D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"346E0D1B-CF9E-48BC-AE7A-F8CEF09F6741\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0123D2ED-3983-45D3-B54A-3E75FCE99C6D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66CA6C29-1DF1-46E3-BDCA-9ED72D3E6731\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50E974E-87F5-45A2-88BA-B1E4913E3DAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4AB25CC-BB96-4675-98D7-C5FF30C24014\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7C95AD-3D5F-458B-A761-5D7779FEA327\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E4A3F6-5D89-47D0-84AD-601682399D8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C700A36D-5FB4-475D-BE85-74511830870A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02060365-1D67-4611-8D79-B9FC354EBF99\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194BD880-F672-4492-8356-B14C8DA8C2DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D769FC-3081-48F8-BBF1-3964F3F8B569\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A966DB26-8A52-4F4D-9C0E-8A8719A195AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6675DF0-963A-4091-9786-7CE3337EE47E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A94931-8584-4021-A5BB-83FF22D54955\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F06FB120-9BB3-4363-B2A2-A3475993FDFD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8229DE3A-B9CB-44FF-8409-51E09DDED479\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAD7A89-294A-45DA-B5F5-C69F7FCC4A5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2699E7A6-7B3A-4C4C-9472-B8B6B547624D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D913348F-351C-4D78-A0AA-27B355D52235\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E88A46-CEC7-46D5-9697-232E18531FD5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F16B8D0-81F5-4ECE-8276-EC30DDCCE1A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ECFBAFE-9267-469A-A97F-F716969B247C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F839C7-7B33-4BF6-9ACF-76F32F5D7C72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1559E6-E7B6-4B5B-8841-CF502E05BA46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F041246F-5B7F-4F63-9E81-02465C9062C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB78013-DEE9-438E-ABD1-5E3D932177BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77447C3-AA72-4CAB-A0B1-0883D41AD064\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"473038C0-1644-4FF2-A1DA-BCB8A7CD1CA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C3F04F-7581-4DCA-970D-9FCBB56EA724\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ABF04A7-8230-4AB9-8D66-DF1463037823\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC205E36-7027-4A9B-8574-9BB9C68007A5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C55DD7-986A-4AB6-8F61-5A5D26531011\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84DDD7E4-D5D7-4341-9482-2B918306578D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14A3C59C-6A3D-477B-B425-1C085D6951E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31AA57F4-5023-4333-9F19-C9D362E8E495\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063034FF-0AB8-4D78-9822-0DCA9657C853\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67477EC7-363E-45B5-BA53-1A4E9FB20CDE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E11F95-E635-465C-BD7F-5F7E9192DEAC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F145F0-573E-4CBC-AB69-3B77D6F9A540\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DA7D86-8845-43CA-80DC-3D794322CB28\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD34FEB-7956-44AE-A510-2E5F9EF61651\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DEF5098-3791-4CEB-A436-2809A4385D27\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D895880-FB98-4472-A164-458CE086F339\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7912AA3-0469-479E-9C5A-53F20E504956\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8677C6C8-39CA-492A-A196-9DFAF892120C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51FA6F2A-8444-4BB2-B7F2-B97AEFFF9E27\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E46CAD-0032-4CD6-AA2A-871E1DFC3A35\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22CE55DE-00CA-4F87-9CA0-80A360E332FA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63DC81FA-A6B4-41DC-8097-8944D06A2451\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB87853E-CAFF-48D8-9C56-A2DE325235D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E35451-BEE3-412A-8706-5522C00BE1DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E599E0CE-CCB7-4A30-8AA9-45BBC11AFEC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F45326B3-CC4E-4C3A-9819-28936A0432F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDBF1A78-7190-4326-84BD-C18CC354DA38\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97FFBA0-2E80-40EF-A4AC-F26D3490371E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A442F5B-5A1A-4CD0-B693-851FFB917E5D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"074BCB70-AD66-4141-9DD3-9DE73BDCB0F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"646BF70F-CB7B-48E3-8563-E089E1CECD11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD34A7B-508C-45F2-8725-FE42398D3652\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2785732-A5C7-434E-B45D-13138B574F45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989A4E8A-F23D-4BF5-B860-FB7B04A1CE56\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07E1241-24BE-48D3-B737-56B2AAA3AF64\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB751FD-CCCA-4131-A24F-65DEF1128B26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D106F4E4-4B41-4002-8C34-6A9C3A0FF640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863583DC-DD93-46DC-BA06-0B838CDB2565\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D50E1B4-A64E-45D5-8A44-947DE7B8AAD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5F1A8F-5ED9-4ED0-A336-A0E4A439E6F2\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.ingate.com/pipermail/productinfo/2008/000021.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0528.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/30574\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30596\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30612\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/30615\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30626\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30647\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30648\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30665\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30802\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31334\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31351\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31467\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31568\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32664\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33003\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35463\",\"source\":\"cret@cert.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200808-02.xml\",\"source\":\"cret@cert.org\"},{\"url\":\"http://securityreason.com/securityalert/3933\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=833770\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://support.apple.com/kb/HT2163\",\"source\":\"cret@cert.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1663\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/878044\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7ETS87\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:118\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-006.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/06/09/1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0529.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/493218/100/0/threaded\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/497962/100/0/threaded\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/bid/29623\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1020218\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-685-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-162A.html\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0013.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0017.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1787/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1788/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1797/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1800/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1801/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1836/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1981/references\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2361\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2971\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1612\",\"source\":\"cret@cert.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=447974\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.exploit-db.com/exploits/5790\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.ingate.com/pipermail/productinfo/2008/000021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2008-0528.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30574\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30596\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30612\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30615\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30647\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30665\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35463\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200808-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/3933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=833770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT2163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/878044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MIMG-7ETS87\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:118\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/06/09/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0529.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/493218/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/497962/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/29623\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1020218\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-685-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-162A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2008-0017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1787/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1788/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1797/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1800/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1801/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1836/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1981/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2971\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1612\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=447974\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/5790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2008-AVI-343
Vulnerability from certfr_avis - Published: 2008-07-02 - Updated: 2008-07-02
Plusieurs vulnérablités concernant le système d'exploitation Apple Mac OS X ont été corrigées.
Description
Plusieurs vulnérablités ont été corrigées :
- Alias Manager : un alias spécifiquement créé permet l'exécution de code arbitraire ;
- CoresTypes : des contenus incertains peuvent être ouverts automatiquement ;
- c++filt : une chaine de caratères spécifiquement créée permet l'exécution de code arbitraire ;
- Dock : une personne ayant physiquement accès à la machine peut contourner l'écran de verrouillage ;
- Launch Services : du code malveillant peut être exécuté via un site Web malveillant ;
- Net-SNMP : il est possible de contrefaire un paquet SNMPv3 ;
- Ruby : une chaine de caractères ou un tableau spécifiquement créé permet l'exécution de code arbitraire ;
- SMB File Server : une trame SMB spécialement réalisée permet l'exécution de code arbitraire ;
- System Configuration : un utilisateur local peut exécuter du code arbitraire avec les droits de nouveaux utilisateurs ;
- Tomcat : plusieurs vulnérabilités affectent le logiciel dont une permettant des attaques de type Cross Site Scripting ;
- VPN : un attaquant peut réaliser un déni de service à distance à l'aide de paquets UDP spécifiquement créés ;
- Webkit : du code malveillant peut être exécuté via un site Web malveillant.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apple Mac OS X versions v10.5.3 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eApple Mac OS X versions v10.5.3 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rablit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es :\n\n- Alias Manager : un alias sp\u00e9cifiquement cr\u00e9\u00e9 permet l\u0027ex\u00e9cution de\n code arbitraire ;\n- CoresTypes : des contenus incertains peuvent \u00eatre ouverts\n automatiquement ;\n- c++filt : une chaine de carat\u00e8res sp\u00e9cifiquement cr\u00e9\u00e9e permet\n l\u0027ex\u00e9cution de code arbitraire ;\n- Dock : une personne ayant physiquement acc\u00e8s \u00e0 la machine peut\n contourner l\u0027\u00e9cran de verrouillage ;\n- Launch Services : du code malveillant peut \u00eatre ex\u00e9cut\u00e9 via un site\n Web malveillant ;\n- Net-SNMP : il est possible de contrefaire un paquet SNMPv3 ;\n- Ruby : une chaine de caract\u00e8res ou un tableau sp\u00e9cifiquement cr\u00e9\u00e9\n permet l\u0027ex\u00e9cution de code arbitraire ;\n- SMB File Server : une trame SMB sp\u00e9cialement r\u00e9alis\u00e9e permet\n l\u0027ex\u00e9cution de code arbitraire ;\n- System Configuration : un utilisateur local peut ex\u00e9cuter du code\n arbitraire avec les droits de nouveaux utilisateurs ;\n- Tomcat : plusieurs vuln\u00e9rabilit\u00e9s affectent le logiciel dont une\n permettant des attaques de type Cross Site Scripting ;\n- VPN : un attaquant peut r\u00e9aliser un d\u00e9ni de service \u00e0 distance \u00e0\n l\u0027aide de paquets UDP sp\u00e9cifiquement cr\u00e9\u00e9s ;\n- Webkit : du code malveillant peut \u00eatre ex\u00e9cut\u00e9 via un site Web\n malveillant.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2663"
},
{
"name": "CVE-2007-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2450"
},
{
"name": "CVE-2008-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2309"
},
{
"name": "CVE-2008-2725",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2725"
},
{
"name": "CVE-2008-2313",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2313"
},
{
"name": "CVE-2008-1145",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1145"
},
{
"name": "CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"name": "CVE-2008-2311",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2311"
},
{
"name": "CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"name": "CVE-2007-3383",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3383"
},
{
"name": "CVE-2008-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1105"
},
{
"name": "CVE-2005-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3164"
},
{
"name": "CVE-2008-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0960"
},
{
"name": "CVE-2008-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2664"
},
{
"name": "CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"name": "CVE-2007-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2449"
},
{
"name": "CVE-2007-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1355"
},
{
"name": "CVE-2008-2726",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2726"
},
{
"name": "CVE-2008-2314",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2314"
},
{
"name": "CVE-2008-2662",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2662"
},
{
"name": "CVE-2008-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2307"
},
{
"name": "CVE-2008-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2308"
},
{
"name": "CVE-2007-6276",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6276"
},
{
"name": "CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"name": "CVE-2008-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2310"
}
],
"initial_release_date": "2008-07-02T00:00:00",
"last_revision_date": "2008-07-02T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 2008-004 du 30 juin 2008 :",
"url": "http://support.apple.com/kb/HT2163"
}
],
"reference": "CERTA-2008-AVI-343",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-07-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rablit\u00e9s concernant le syst\u00e8me d\u0027exploitation Apple Mac\nOS X ont \u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Apple 2008-004 du 30 juin 2008",
"url": null
}
]
}
CERTA-2008-AVI-302
Vulnerability from certfr_avis - Published: 2008-06-10 - Updated: 2008-11-20
Une vulnérabilité affectant Net-SNMP permet à une personne malintentionnée de contourner la politique de sécurité.
Description
Une vulnérabilité a été identifiée dans Net-SNMP. Une faille dans la vérification des HMAC d'authentification permet à une personne d'usurper des paquets et donc de contourner la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Net-SNMP 5.x. D'autres implémentations sont vulnérables, telles que UCD-SNMP.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eNet-SNMP 5.x. D\u0027autres impl\u00e9mentations sont vuln\u00e9rables, telles que UCD-SNMP.\u003c/P\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 identifi\u00e9e dans Net-SNMP. Une faille dans la\nv\u00e9rification des HMAC d\u0027authentification permet \u00e0 une personne d\u0027usurper\ndes paquets et donc de contourner la politique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0960"
}
],
"initial_release_date": "2008-06-10T00:00:00",
"last_revision_date": "2008-11-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian du 09 novembre 2008 :",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"title": "Alerte de s\u00e9curit\u00e9 de l\u0027US-CERT TA08-162A du 10 juin 2008 :",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
}
],
"reference": "CERTA-2008-AVI-302",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2008-06-10T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence \u00e0 l\u0027alerte de l\u0027US-CERT ;",
"revision_date": "2008-06-11T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence debian.",
"revision_date": "2008-11-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 affectant Net-SNMP permet \u00e0 une personne\nmalintentionn\u00e9e de contourner la politique de s\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Net-SNMP",
"vendor_advisories": [
{
"published_at": null,
"title": "Annonce de s\u00e9curit\u00e9 Net-SNMP du 09 juin 2008",
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
}
]
}
CERTA-2008-AVI-310
Vulnerability from certfr_avis - Published: 2008-06-11 - Updated: 2008-06-11
Une vulnérabilité affectant des produits Cisco permet à une personne malintentionnée de contourner la politique de sécurité.
Description
La vulnérabilité détaillée dans l'avis CERTA-2008-AVI-302 du 10 juin 2008 affecte également certains produits Cisco. Ainsi, une personne malveillante peut usurper des paquets en envoyant des messages d'authentification HMAC spécialement construits.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco CATOS 6.x, 7.x, 8.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cicso Application Control Engine XML Gateway ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Application Control Engine Appliance ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco NX-OS 4.x ;",
"product": {
"name": "NX-OS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco SAN-OS 2.x, 3.x (MDS 9000).",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS 12.x, R12.x, XR 3.x ;",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLa vuln\u00e9rabilit\u00e9 d\u00e9taill\u00e9e dans l\u0027avis CERTA-2008-AVI-302 du 10 juin\n2008 affecte \u00e9galement certains produits Cisco. Ainsi, une personne\nmalveillante peut usurper des paquets en envoyant des messages\nd\u0027authentification HMAC sp\u00e9cialement construits.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0960"
}
],
"initial_release_date": "2008-06-11T00:00:00",
"last_revision_date": "2008-06-11T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco 20080610-snmpv3 du 10 juin 2008 :",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"title": "Document du CERTA CERTA-2008-AVI-302 du 10 juin 2008 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2008-AVI-302/index.html"
}
],
"reference": "CERTA-2008-AVI-310",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 affectant des produits Cisco permet \u00e0 une personne\nmalintentionn\u00e9e de contourner la politique de s\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits CISCO",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis cisco-sa-20080610-snmpv3",
"url": null
}
]
}
CERTA-2010-AVI-287
Vulnerability from certfr_avis - Published: 2010-06-24 - Updated: 2010-06-24
Une vulnérabilité dans HP Openview SNMP Emanate Master Agent permet à un utilisateur malveillant de contourner la politique de sécurité.
Description
Une faiblesse est présente dans la phase de vérification par HP Openview SNMP Emanate Master Agent de l'authentification SNMPv3. Elle permet à un utilisateur malveillant, distant, non authentifié, de contourner la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
HP Openview SNMP Emanate Master Agent sur plateforme HP-UX, Linux, Solaris et Windows.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eHP Openview SNMP Emanate Master Agent sur plateforme HP-UX, Linux, Solaris et Windows.\u003c/p\u003e",
"content": "## Description\n\nUne faiblesse est pr\u00e9sente dans la phase de v\u00e9rification par HP Openview\nSNMP Emanate Master Agent de l\u0027authentification SNMPv3. Elle permet \u00e0 un\nutilisateur malveillant, distant, non authentifi\u00e9, de contourner la\npolitique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0960"
}
],
"initial_release_date": "2010-06-24T00:00:00",
"last_revision_date": "2010-06-24T00:00:00",
"links": [
{
"title": "Site de t\u00e9l\u00e9chargement des correctifs HP Openview :",
"url": "http://support.openview.hp.com/selfsolve/patches"
},
{
"title": "Document du CERTA CERTA-2008-AVI-302 du 10 juin 2008 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2008-AVI-302/index.html"
}
],
"reference": "CERTA-2010-AVI-287",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-06-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans HP Openview SNMP Emanate Master Agent permet \u00e0 un\nutilisateur malveillant de contourner la politique de s\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans HP Openview",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP HPSBMA02439 du 22 juin 2010",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01757418"
}
]
}
RHSA-2008:0528
Vulnerability from csaf_redhat - Published: 2008-06-10 07:01 - Updated: 2025-11-21 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ucd-snmp packages that fix a security issue are now available for\nRed Hat Enterprise Linux 2.1.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Simple Network Management Protocol (SNMP) is a protocol used for\nnetwork management.\n\nA flaw was found in the way ucd-snmp checked an SNMPv3 packet\u0027s Keyed-Hash\nMessage Authentication Code (HMAC). An attacker could use this flaw to\nspoof an authenticated SNMPv3 packet. (CVE-2008-0960)\n\nAll users of ucd-snmp should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0528",
"url": "https://access.redhat.com/errata/RHSA-2008:0528"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "447974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0528.json"
}
],
"title": "Red Hat Security Advisory: ucd-snmp security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:25+00:00",
"generator": {
"date": "2025-11-21T17:33:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0528",
"initial_release_date": "2008-06-10T07:01:00+00:00",
"revision_history": [
{
"date": "2008-06-10T07:01:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-06-10T03:01:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"product": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"product_id": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ucd-snmp-utils@4.2.5-8.AS21.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"product": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"product_id": "ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ucd-snmp@4.2.5-8.AS21.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"product": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"product_id": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ucd-snmp-devel@4.2.5-8.AS21.7?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ucd-snmp-0:4.2.5-8.AS21.7.src",
"product": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.src",
"product_id": "ucd-snmp-0:4.2.5-8.AS21.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ucd-snmp@4.2.5-8.AS21.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"product": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"product_id": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ucd-snmp-utils@4.2.5-8.AS21.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ucd-snmp-0:4.2.5-8.AS21.7.i386",
"product": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.i386",
"product_id": "ucd-snmp-0:4.2.5-8.AS21.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ucd-snmp@4.2.5-8.AS21.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"product": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"product_id": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ucd-snmp-devel@4.2.5-8.AS21.7?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.src"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.src as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.src"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.src",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.src"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-0:4.2.5-8.AS21.7.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.src"
},
"product_reference": "ucd-snmp-0:4.2.5-8.AS21.7.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386"
},
"product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64"
},
"product_reference": "ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"relates_to_product_reference": "2.1WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-0960",
"discovery_date": "2008-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "447974"
}
],
"notes": [
{
"category": "description",
"text": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp SNMPv3 authentication bypass (VU#877044)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0960"
},
{
"category": "external",
"summary": "RHBZ#447974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960"
}
],
"release_date": "2008-06-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-10T07:01:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0528"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1AS:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1AS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1AW:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1ES:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-0:4.2.5-8.AS21.7.src",
"2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-devel-0:4.2.5-8.AS21.7.ia64",
"2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.i386",
"2.1WS:ucd-snmp-utils-0:4.2.5-8.AS21.7.ia64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp SNMPv3 authentication bypass (VU#877044)"
}
]
}
RHSA-2008:0529
Vulnerability from csaf_redhat - Published: 2008-06-10 14:07 - Updated: 2025-11-21 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated net-snmp packages that fix a security issue are now available for\nRed Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Simple Network Management Protocol (SNMP) is a protocol used for\nnetwork management.\n\nA flaw was found in the way Net-SNMP checked an SNMPv3 packet\u0027s Keyed-Hash\nMessage Authentication Code (HMAC). An attacker could use this flaw to\nspoof an authenticated SNMPv3 packet. (CVE-2008-0960)\n\nA buffer overflow was found in the Perl bindings for Net-SNMP. This could\nbe exploited if an attacker could convince an application using the\nNet-SNMP Perl module to connect to a malicious SNMP agent. (CVE-2008-2292)\n\nAll users of net-snmp should upgrade to these updated packages, which\ncontain backported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0529",
"url": "https://access.redhat.com/errata/RHSA-2008:0529"
},
{
"category": "external",
"summary": "447262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447262"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "447974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0529.json"
}
],
"title": "Red Hat Security Advisory: net-snmp security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:25+00:00",
"generator": {
"date": "2025-11-21T17:33:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0529",
"initial_release_date": "2008-06-10T14:07:00+00:00",
"revision_history": [
{
"date": "2008-06-10T14:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-06-10T10:09:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product": {
"name": "Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.5::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product": {
"name": "Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.5::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"product": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"product": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"product": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"product": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"product": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.1.ia64",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.ia64",
"product_id": "net-snmp-1:5.3.1-24.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.24.ia64",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.24.ia64",
"product_id": "net-snmp-0:5.0.9-2.30E.24.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"product": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"product": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"product": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"product": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"product": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.1.i386",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.i386",
"product_id": "net-snmp-1:5.3.1-24.el5_2.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.24.i386",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.i386",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.24.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.24.i386",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.24.i386",
"product_id": "net-snmp-0:5.0.9-2.30E.24.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.24.i386",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.i386",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.24.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.24.i386",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.i386",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.24.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.24.i386",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.i386",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.24.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"product": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"product": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"product": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"product": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"product": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"product_id": "net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.24.x86_64",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.24.x86_64",
"product_id": "net-snmp-0:5.0.9-2.30E.24.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"product": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=src"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.1.src",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.src",
"product_id": "net-snmp-1:5.3.1-24.el5_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.24.src",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.24.src",
"product_id": "net-snmp-0:5.0.9-2.30E.24.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"product": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"product": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"product": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"product": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"product": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"product": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.1.ppc",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.ppc",
"product_id": "net-snmp-1:5.3.1-24.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.24.ppc",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.24.ppc",
"product_id": "net-snmp-0:5.0.9-2.30E.24.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"product": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"product": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"product": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"product": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"product": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.1.s390x",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.s390x",
"product_id": "net-snmp-1:5.3.1-24.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.24.s390x",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390x",
"product_id": "net-snmp-0:5.0.9-2.30E.24.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"product_id": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-11.el4_6.11.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"product": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"product_id": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-11.el4_6.11.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"product": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"product_id": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-11.el4_6.11.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"product": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"product_id": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-11.el4_6.11.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"product": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"product_id": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-11.el4_6.11.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"product": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"product_id": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-11.el4_6.11.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.1?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.24?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.24.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.24?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.24.s390",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390",
"product_id": "net-snmp-0:5.0.9-2.30E.24.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.24?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.24.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.24?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.24.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.24?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.24.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.24?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.src"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.src"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.src"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.src"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)",
"product_id": "4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)",
"product_id": "4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES-4.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.src"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.src"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-0960",
"discovery_date": "2008-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "447974"
}
],
"notes": [
{
"category": "description",
"text": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp SNMPv3 authentication bypass (VU#877044)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:net-snmp-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-0:5.0.9-2.30E.24.src",
"3AS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.src",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-0:5.0.9-2.30E.24.src",
"3ES:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-0:5.0.9-2.30E.24.src",
"3WS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0960"
},
{
"category": "external",
"summary": "RHBZ#447974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0960",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0960"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960"
}
],
"release_date": "2008-06-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-10T14:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:net-snmp-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-0:5.0.9-2.30E.24.src",
"3AS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.src",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-0:5.0.9-2.30E.24.src",
"3ES:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-0:5.0.9-2.30E.24.src",
"3WS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0529"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"3AS:net-snmp-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-0:5.0.9-2.30E.24.src",
"3AS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.src",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-0:5.0.9-2.30E.24.src",
"3ES:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-0:5.0.9-2.30E.24.src",
"3WS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp SNMPv3 authentication bypass (VU#877044)"
},
{
"cve": "CVE-2008-2292",
"discovery_date": "2008-05-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "447262"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: buffer overflow in perl module\u0027s Perl Module __snprint_value()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:net-snmp-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-0:5.0.9-2.30E.24.src",
"3AS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.src",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-0:5.0.9-2.30E.24.src",
"3ES:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-0:5.0.9-2.30E.24.src",
"3WS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2292"
},
{
"category": "external",
"summary": "RHBZ#447262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2292",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2292"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2292",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2292"
}
],
"release_date": "2007-11-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-06-10T14:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:net-snmp-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-0:5.0.9-2.30E.24.src",
"3AS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3AS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.src",
"3Desktop:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-0:5.0.9-2.30E.24.src",
"3ES:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3ES:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-0:5.0.9-2.30E.24.src",
"3WS:net-snmp-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-devel-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.ppc64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-libs-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-perl-0:5.0.9-2.30E.24.x86_64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.i386",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ia64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.ppc",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.s390x",
"3WS:net-snmp-utils-0:5.0.9-2.30E.24.x86_64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4AS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4AS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4Desktop:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4Desktop:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES-4.5.z:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES-4.5.z:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4ES:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4ES:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.src",
"4WS:net-snmp-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-debuginfo-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-devel-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.ppc64",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-libs-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-perl-0:5.1.2-11.el4_6.11.3.x86_64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.i386",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ia64",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.ppc",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.s390x",
"4WS:net-snmp-utils-0:5.1.2-11.el4_6.11.3.x86_64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Client:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.src",
"5Server:net-snmp-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.ppc64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.1.x86_64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.i386",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ia64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.ppc",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.s390x",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0529"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net-snmp: buffer overflow in perl module\u0027s Perl Module __snprint_value()"
}
]
}
GHSA-XMP9-M365-HWWG
Vulnerability from github – Published: 2022-05-01 23:35 – Updated: 2022-05-01 23:35SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
{
"affected": [],
"aliases": [
"CVE-2008-0960"
],
"database_specific": {
"cwe_ids": [
"CWE-287"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-06-10T18:32:00Z",
"severity": "HIGH"
},
"details": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.",
"id": "GHSA-xmp9-m365-hwwg",
"modified": "2022-05-01T23:35:08Z",
"published": "2022-05-01T23:35:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0960"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30574"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30596"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30612"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30615"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30626"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30647"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30648"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30665"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30802"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31334"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31351"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31467"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31568"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32664"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33003"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35463"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"type": "WEB",
"url": "http://securityreason.com/securityalert/3933"
},
{
"type": "WEB",
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"type": "WEB",
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT2163"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
},
{
"type": "WEB",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
},
{
"type": "WEB",
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/29623"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020218"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1612"
}
],
"schema_version": "1.4.0",
"severity": []
}
VAR-200806-0575
Vulnerability from variot - Updated: 2025-12-22 20:51SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. SNMPv3 The implementation of contains an authentication bypass vulnerability because it does not properly handle crafted packets. SNMP (Simple Network Management Protocol) Is a widely used protocol for monitoring and managing network devices. SNMPv3 Supports security features such as authentication and privacy control. SNMPv3 In the authentication of HMAC (keyed-Hash Message Authentication Code) Is used. This code is generated by combining a private key and a cryptographic hash function. SNMPv3 Depending on the implementation of, there is a possibility that authentication may be bypassed by processing specially crafted packets due to vulnerability in authentication processing.By remote third party SNMP The object may be read or modified. Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error. Successfully exploiting this issue will allow attackers to gain unauthorized access to the affected application. Net-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. An attacker could exploit this vulnerability to read and modify any SNMP object accessible using the authenticated credentials logged into the system. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities
Document ID: 107408
Advisory ID: cisco-sa-20080610-snmpv3
http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
Revision 1.0
For Public Release 2008 June 10 1600 UTC (GMT)
Summary
Multiple Cisco products contain either of two authentication vulnerabilities in the Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the disclosure of network information or may enable an attacker to perform configuration changes to vulnerable devices. The SNMP server is an optional service that is disabled by default in Cisco products. Only SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact of the vulnerabilities described in this document.
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability Note VU#878044 to these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has also been assigned to these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
Affected Products
Vulnerable Products +------------------
The following Cisco products are vulnerable.
- Cisco IOS
- Cisco IOS-XR
- Cisco Catalyst Operating System (CatOS)
- Cisco NX-OS
- Cisco Application Control Engine (ACE) Module
- Cisco ACE Appliance
- Cisco ACE XML Gateway
- Cisco MDS 9000 Series Multilayer Fabric Switches
Note: The SNMP server is disabled by default. These vulnerabilities only impact devices that are configured for SNMPv3.
To determine the version of SNMP configured in Cisco IOS, CatOS and IOS-XR, log in to the device and issue the show snmp group command. The security model field indicates the version of SNMP configured. The output "usm" is the abbreviation for user-based security model and this indicates SNMPv3 is configured.
Cisco IOS
router#show snmp group
groupname: test security model:v3 noauth
readview : v1default writeview: <no writeview specified>
notifyview: <no notifyview specified>
row status: active
Cisco CatOS
5500-1 (enable) show snmp group
Security Model: v3
Security Name: userv3
Group Name: groupv3
Storage Type: nonvolatile
Row Status: active
Cisco IOS-XR
RP/0/RP0/CPU0:ios#show snmp group
groupname: test security model:usm
readview : v1default writeview: -
notifyview: v1default
row status: nonVolatile
IronPort +-------
IronPort C-Series, X-Series, and M-Series appliances utilize code covered by this advisory, but are not susceptible to any security risk. IronPort C-Series, X-Series, and M-Series incorporate the libraries under the advisory to provide anonymous read-only access to system health data. There is no risk of escalated authorization privileges allowing a 3rd party to make any configuration changes to the IronPort devices. IronPort S-Series and Encryption Appliances are not affected by this advisory. This announcement has also been posted on the IronPort Support Portal, available to IronPort customers:
https://supportportal.ironport.com/irppcnctr/srvcd?u=http://secure-support.soma.ironport.com/announcement&sid=900016
Products Confirmed Not Vulnerable +--------------------------------
The following Cisco products are confirmed not vulnerable:
- Cisco PIX Security Appliances
- Cisco ASA Security Appliances
- Cisco Firewall Services Module (FWSM)
- Cisco Security Monitoring, Analysis, and Response System (MARS)
- Cisco Network Admission Control (NAC) Appliance
- CiscoWorks Wireless LAN Solution Engine (WLSE)
No other Cisco products are currently known to be affected by these vulnerabilities.
There are three general types of SNMP operations: "get" requests to request information, "set" requests that modify the configuration of a remote device, and "trap" messages that provide a monitoring function. SNMP requests and traps are transported over User Datagram Protocol (UDP) and are received at the assigned destination port numbers 161 and 162, respectively.
SNMPv3 provides secure access to devices by authenticating and encrypting packets over the network. RFC2574 defines the use of HMAC-MD5-96 and HMAC-SHA-96 as the possible authentication protocols for SNMPv3. This advisory identifies two vulnerabilities that are almost identical. Both are specifically related to malformed SNMPv3 packets that manipulate the Hash Message Authentication Code (HMAC). The two vulnerabilities may impact both Secure Hashing Algorithm-1 (SHA-1) and Message-Digest Algorithm 5 (MD5). The vulnerabilities described in this document can be successfully exploited using spoofed SNMPv3 packets.
These vulnerabilities are documented in the following Cisco Bug IDs:
- CSCsf04754 - IOS SNMPv3 HMAC Authentication issue
- CSCsf30109 - IOS-XR SNMPv3 HMAC Authentication issue
- CSCsf29976 - CatOS SNMPv3 HMAC Authentication issue
- CSCsq62662 - ACE XML Gw SNMPv3 HMAC Authentication issue
- CSCsq60664 - ACE Appliance SNMPv3 HMAC Authentication issue
- CSCsq60695 - ACE Module SNMPv3 HMAC Authentication issue
- CSCsq60582 - Nexus SNMPv3 HMAC Authentication issue
Note: Although multiple software defects are listed, this advisory only identifies two vulnerabilities. Because different Cisco products require their own fixes, additional Bug IDs have been assigned.
Vulnerability Scoring Details
Cisco has provided scores for the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding CVSS at
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at
http://intellishield.cisco.com/security/alertmanager/cvss
CSCsf04754 - IOS SNMPv3 HMAC Authentication issue
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
CSCsf30109 - IOS-XR SNMPv3 HMAC Authentication issue
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
CSCsf29976 - CatOS SNMPv3 HMAC Authentication issue
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
CSCsq62662 - ACE XML Gw SNMPv3 HMAC Authentication issue
CVSS Base Score - 9.3
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 7.7
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
CSCsq60664 - ACE Appliance SNMPv3 HMAC Authentication issue
CVSS Base Score - 9.3
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.4
Exploitability - Functional
Remediation Level - Workaround
Report Confidence - Confirmed
CSCsq60695 - ACE Module SNMPv3 HMAC Authentication issue
CVSS Base Score - 9.3
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.4
Exploitability - Functional
Remediation Level - Workaround
Report Confidence - Confirmed
CSCsq60582 - Nexus SNMPv3 HMAC Authentication issue
CVSS Base Score - 9.3
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.4
Exploitability - Functional
Remediation Level - Workaround
Report Confidence - Confirmed
Impact
Successful exploitation of these vulnerabilities could result in the disclosure of sensitive information on a device or allow an attacker to make configuration changes to a vulnerable device that is based on the SNMP configuration.
Software Versions and Fixes
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance.
Each row of the Cisco IOS software table (below) names a Cisco IOS release train. If a given release train is vulnerable, then the earliest possible releases that contain the fix (along with the anticipated date of availability for each, if applicable) are listed in the "First Fixed Release" column of the table. The "Recommended Release" column indicates the releases which have fixes for all the published vulnerabilities at the time of this Advisory. A device running a release in the given train that is earlier than the release in a specific column (less than the First Fixed Release) is known to be vulnerable. Cisco recommends upgrading to a release equal to or later than the release in the "Recommended Releases" column of the table.
+---------------------------------------+ | Affected | Affected | First | | Product | Release | Fixed | | | | Release | |-----------------+----------+----------| | | 6.x | 6.4(23) | | |----------+----------| | Cisco Catalyst | 7.x | 7.6(19) | |Operating |----------+----------| | System (CatOS) | 8.5.x | 8.5(7) | | |----------+----------| | | 8.6.x | 8.6(1) | +---------------------------------------+
Cisco IOS XR +-----------
The following table lists fixed Cisco IOS XR software.
+---------------------------------------------------+ | Cisco | | | | IOS XR | SMU ID | SMU Name | | Version | | | |---------+------------+----------------------------| | 3.2.2 | AA01681 | hfr-base-3.2.2.CSCsf30109 | |---------+------------+----------------------------| | 3.2.3 | AA01682 | hfr-base-3.2.3.CSCsf30109 | |---------+------------+----------------------------| | 3.2.4 | AA01683 | hfr-base-3.2.4.CSCsf30109 | |---------+------------+----------------------------| | 3.2.6 | AA01684 | hfr-base-3.2.6.CSCsf30109 | |---------+------------+----------------------------| | 3.3.0 | AA01685 | hfr-base-3.3.0.CSCsf30109 | |---------+------------+----------------------------| | 3.3.0 | AA01690 | c12k-base-3.3.0.CSCsf30109 | |---------+------------+----------------------------| | 3.3.1 | AA01686 | hfr-base-3.3.1.CSCsf30109 | |---------+------------+----------------------------| | 3.3.1 | AA01688 | c12k-base-3.3.1.CSCsf30109 | |---------+------------+----------------------------| | 3.3.2 | Not | Not vulnerable | | | vulnerable | | |---------+------------+----------------------------| | 3.4.x | Not | Not vulnerable | | | vulnerable | | +---------------------------------------------------+
Cisco NX-OS +----------
The following table lists fixed Cisco NX-OS software.
+----------------------------------------+ | Affected | Affected | First Fixed | | Product | Release | Release | |-----------+-----------+----------------| | Cisco | | 4.0.(2) | | NX-OS | 4.0.(1)a | Available June | | | | 2008 | +----------------------------------------+
Cisco ACE Products +-----------------
The following table lists fixed Cisco Application Control Engine (ACE) software.
+---------------------------------------+ | Affected | Affected | First | | Product | Release | Fixed | | | | Release | |----------------+----------+-----------| | | 3.0(0)A1 | | | Cisco | (6.x) | | | Application | | A2(1.1) | | Control Engine | A2(1.0) | | | (ACE) Module | | | | | A2(1.0a) | | |----------------+----------+-----------| | | A1(7.0) | | | | | | | Cisco | A1(7.0a) | | | Application | | | | Control Engine | A1(7.0b) | A1(8.0a) | | (ACE) | | | | Appliance | A1(7.0c) | | | | | | | | A1(8.0) | | |----------------+----------+-----------| | Cisco | 4.x | | | Application | | 6.0.1 | | Control Engine | 5.x | Available | | (ACE) XML | | June 2008 | | Gateway | 6.0 | | +---------------------------------------+
Cisco MDS software +-----------------
The following table lists fixed Cisco MDS Multilayer Switch software.
+---------------------------------------+ | Affected | Affected | First Fixed | | Product | Release | Release | |-----------+-----------+---------------| | | 2.1 | | | Cisco MDS | | 3.4.1 | | 9000 | 3.0 | Available | | | | June 2008 | | | 3.2 | | +---------------------------------------+
Workarounds
The following workarounds have been identified for these vulnerabilities.
Infrastructure Access Control Lists +----------------------------------
Although it is often difficult to block traffic that transits a network, it is possible to identify traffic that should never be allowed to target infrastructure devices and block that traffic at the border of networks. Infrastructure Access Control Lists (iACLs) are a network security best practice and should be considered as a long-term addition to good network security as well as a workaround for these specific vulnerabilities. The iACL example below should be included as part of the deployed infrastructure access-list which will protect all devices with IP addresses in the infrastructure IP address range:
Note: UDP port 161 is applicable for all versions of SNMP.
!--- Permit SNMP UDP 161 packets from
!--- trusted hosts destined to infrastructure addresses.
access-list 150 permit udp TRUSTED_HOSTS MASK INFRASTRUCTURE_ADDRESSES MASK eq 161
!--- Deny SNMP UDP 161 packets from all
!--- other sources destined to infrastructure addresses.
access-list 150 deny udp any INFRASTRUCTURE_ADDRESSES MASK eq 161
!--- Permit/deny all other Layer 3 and Layer 4 traffic in accordance
!--- with existing security policies and configurations
!--- Permit all other traffic to transit the device.
access-list 150 permit ip any anyinterface serial 2/0ip access-group 150 in
The white paper entitled "Protecting Your Core: Infrastructure Protection Access Control Lists" presents guidelines and recommended deployment techniques for infrastructure protection access lists. This white paper can be obtained at the following link: http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801a1a55.shtml
Control Plane Policing +---------------------
Control Plane Policing (CoPP) can be used to block untrusted SNMP access to the device. Cisco IOS software releases 12.0S, 12.2SX, 12.2S, 12.3T, 12.4, and 12.4T support the CoPP feature. CoPP can be configured on a device to protect the management and control planes and minimize the risk and effectiveness of direct infrastructure attacks by explicitly permitting only authorized traffic that is sent to infrastructure devices in accordance with existing security policies and configurations. The following example, which uses 192.168.100.1 to represent a trusted host, can be adapted to your network.
!--- Deny SNMP UDP traffic from trusted hosts to all IP addresses
!--- configured on all interfaces of the affected device so that
!--- it will be allowed by the CoPP feature
access-list 111 deny udp host 192.168.100.1 any eq 161
!--- Permit all other SNMP UDP traffic sent to all IP addresses
!--- configured on all interfaces of the affected device so that it
!--- will be policed and dropped by the CoPP feature
access-list 111 permit udp any any eq 161
!--- Permit (Police or Drop)/Deny (Allow) all other Layer3 and Layer4
!--- traffic in accordance with existing security policies and
!--- configurations for traffic that is authorized to be sent
!--- to infrastructure devices
!--- Create a Class-Map for traffic to be policed by
!--- the CoPP feature
class-map match-all drop-snmpv3-class
match access-group 111
!--- Create a Policy-Map that will be applied to the
!--- Control-Plane of the device.
policy-map drop-snmpv3-traffic
class drop-snmpv3-class
drop
!--- Apply the Policy-Map to the
!--- Control-Plane of the device
control-plane
service-policy input drop-snmpv3-traffic
In the above CoPP example, the access control list entries (ACEs) that match the potential exploit packets with the "permit" action result in these packets being discarded by the policy-map "drop" function, while packets that match the "deny" action (not shown) are not affected by the policy-map drop function.
Please note that the policy-map syntax is different in the 12.2S and 12.0S Cisco IOS trains:
policy-map drop-snmpv3-traffic
class drop-snmpv3-class
police 32000 1500 1500 conform-action drop exceed-action drop
Additional information on the configuration and use of the CoPP feature is available at the following links:
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6642/prod_white_paper0900aecd804fa16a.html
and
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gtrtlimt.html
Transit Access Control Lists +---------------------------
Filters that deny SNMP packets using UDP port 161 should be deployed throughout the network as part of a Transit Access Control List (tACL) policy for protection of traffic that enters the network at ingress access points. This policy should be configured to protect the network device where the filter is applied and other devices behind it. Filters for SNMP packets that use UDP port 161 should also be deployed in front of vulnerable network devices so that traffic is only allowed from trusted clients.
Additional information about tACLs is available in "Transit Access Control Lists: Filtering at Your Edge:"
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801afc76.shtml
Hardening Guide Statement +------------------------
Customers are advised to review the "Fortifying the Simple Network Management Protocol" section of the "Cisco Guide to Harden Cisco IOS Devices" for information on configuring an IOS device for SNMPv3 authentication and privacy:
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml#fortify
Cisco IOS authPriv Configuration +-------------------------------
Enabling the SNMPv3 privacy subsystem (if it is not already in use) is a short-term workaround for users who are unable to upgrade in a timely fashion. This subsystem is used to encrypt SNMPv3 traffic using a shared secret.
In Cisco IOS, administrators can enable this workaround by using the authPriv SNMPv3 feature. Only Cisco IOS crypto images can run the authPriv feature.
Note: Ensure that the management application supports SNMPv3 authPriv before implementing this feature.
Applied Mitigation Bulletin +--------------------------
Additional mitigation techniques that can be deployed on Cisco devices within the network are available in the Cisco Applied Intelligence companion document for this advisory: http://www.cisco.com/warp/public/707/cisco-amb-20080610-SNMPv3.shtml
Obtaining Fixed Software
Cisco has released free software updates that address these vulnerabilities. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html or as otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades.
Customers with Service Contracts +-------------------------------
Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations +------------------------------------------------
Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed.
Customers without Service Contracts +----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows.
- +1 800 553 2447 (toll free from within North America)
- +1 408 526 7209 (toll call from anywhere in the world)
- e-mail: tac@cisco.com
Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC.
Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages.
Exploitation and Public Announcements
Cisco is releasing this combined Cisco IOS and non-IOS product advisory out of our normal bi-yearly IOS security advisory cycle due to public disclosure of these vulnerabilities.
Cisco is not aware of any malicious exploitation of these vulnerabilities.
These vulnerabilities were reported to Cisco by Dr. Tom Dunigan of the University of Tennessee and Net-SNMP in cooperation with the CERT Coordination Center.
Status of this Notice: FINAL
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory is posted on Cisco's worldwide website at :
http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients.
- cust-security-announce@cisco.com
- first-teams@first.org
- bugtraq@securityfocus.com
- vulnwatch@vulnwatch.org
- cisco@spot.colorado.edu
- cisco-nsp@puck.nether.net
- full-disclosure@lists.grok.org.uk
- comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates.
Revision History
+---------------------------------------+ | Revision | | Initial | | 1.0 | 2008-June-10 | public | | | | release | +---------------------------------------+
Cisco Security Procedures
Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psirt.
Updated: Jun 10, 2008 Document ID: 107408
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (Darwin)
iD8DBQFITruJ86n/Gc8U/uARAiuNAJwIq42/p8CUh7Dc88nAn9a1pfhhqgCfWXjv 8bYhCD0EKNQ28koObq4S+vQ= =zOBL -----END PGP SIGNATURE----- .
The authentication code reads the length to be checked from sender input, this allows the sender to supply single byte HMAC code and have a 1 in 256 chance of matching the correct HMAC and authenticating, as only the first byte will be checked. The sender would need to know a valid username.
Currently Net-SNMP and UCD-SNMP are known to be vulnerable, other SNMP implementations may also be affected. The eCos project includes code derived from UCD-SNMP and is therefore also affected.
Affected version:
Net-SNMP <= 5.4.1, <= 5.3.2, <= 5.2.4 UCD-SNMP, all versions eCos, all versions
Fixed version:
Net-SNMP >= 5.4.1.1, >= 5.3.2.1, >= 5.2.4.1 UCD-SNMP, N/A eCos, N/A
Credit: this issue was reported by CERT/CC, it is tracked as VU#878044.
CVE: CVE-2008-0960
Timeline: 2008-06-05: CERT/CC reports VU#878044 to oCERT requesting joint coordination 2008-06-05: contacted affected vendors 2008-06-06: added eCos to affected packages 2008-06-09: patched net-snmp packages released 2008-06-09: advisory release
References: http://sourceforge.net/forum/forum.php?forum_id=833770 http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380 http://www.kb.cert.org/vuls/id/878044
Links: http://www.net-snmp.org http://www.ece.ucdavis.edu/ucd-snmp http://ecos.sourceware.org
Permalink: http://www.ocert.org/advisories/ocert-2008-006.html
-- Andrea Barisani | Founder & Project Coordinator oCERT | Open Source Computer Emergency Response Team
lcars@ocert.org http://www.ocert.org 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E "Pluralitas non est ponenda sine necessitate" . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200808-02
http://security.gentoo.org/
Severity: Normal Title: Net-SNMP: Multiple vulnerabilities Date: August 06, 2008 Bugs: #222265, #225105 ID: 200808-02
Synopsis
Multiple vulnerabilities in Net-SNMP allow for authentication bypass in snmpd and execution of arbitrary code in Perl applications using Net-SMNP.
Background
Net-SNMP is a collection of tools for generating and retrieving SNMP data.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-analyzer/net-snmp < 5.4.1.1 >= 5.4.1.1
Description
Wes Hardaker reported that the SNMPv3 HMAC verification relies on the client to specify the HMAC length (CVE-2008-0960). John Kortink reported a buffer overflow in the Perl bindings of Net-SNMP when processing the OCTETSTRING in an attribute value pair (AVP) received by an SNMP agent (CVE-2008-2292).
Impact
An attacker could send SNMPv3 packets to an instance of snmpd providing a valid user name and an HMAC length value of 1, and easily conduct brute-force attacks to bypass SNMP authentication. An attacker could further entice a user to connect to a malicious SNMP agent with an SNMP client using the Perl bindings, possibly resulting in the execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All Net-SNMP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.1.1"
References
[ 1 ] CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 [ 2 ] CVE-2008-2292 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200808-02.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
CVE-2008-4309
It was reported that an integer overflow in the
netsnmp_create_subtree_cache function in agent/snmp_agent.c allows
remote attackers to cause a denial of service attack via a crafted
SNMP GETBULK request.
For the stable distribution (etch), these problems has been fixed in version 5.2.3-7etch4.
For the testing distribution (lenny) and unstable distribution (sid) these problems have been fixed in version 5.4.1~dfsg-11.
We recommend that you upgrade your net-snmp package.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Source archives:
http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz Size/MD5 checksum: 94030 2ccd6191c3212980956c30de392825ec http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc Size/MD5 checksum: 1046 8018cc23033178515298d5583a74f9ff http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz Size/MD5 checksum: 4006389 ba4bc583413f90618228d0f196da8181
Architecture independent packages:
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb Size/MD5 checksum: 1214368 d579d8f28f3d704b6c09b2b480425086 http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb Size/MD5 checksum: 855594 b5ccd827adbcefcca3557fa9ae28cc08
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 2169470 265835564ef2b0e2e86a08000461c53b http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 944098 5b903886ee4740842715797e3231602c http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 1901802 5486eb1f2a5b076e5342b1dd9cbb12e2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 933202 e3210ba1641079e0c3aaf4a50e89aedd http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 835584 b14db8c5e5b5e2d34799952975f903fb
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 932008 fc79672bf64eaabd41ed1c2f4a42c7da http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 1890766 ae3832515a97a79b31e0e7f0316356ee http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 835088 62867e9ba9dfca3c7e8ae575d5a478f5 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 918844 d2d1bc5f555bc9dba153e2a9a964ffbf http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 1557924 5c2a33a015dd44708a9cc7602ca2525c
arm architecture (ARM)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb Size/MD5 checksum: 909974 4c1cef835efc0b7ff3fea54a618eabee http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb Size/MD5 checksum: 835284 3ac835d926481c9e0f589b578455ddee http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb Size/MD5 checksum: 928252 b98e98b58c61be02e477185293427d5c http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb Size/MD5 checksum: 1778292 b903adf3d1fa6e7a26f7cafb7bffdd6b http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb Size/MD5 checksum: 1344158 78b6cf6b2974983e8e3670468da73cd1
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 835940 9eeaf116e386dd7733ab2106c662dfa9 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 1809132 78bb5f1c12b004d32fa265e6bd99ffa1 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 1926116 71c7f3095ffe1bb22e84ade21f32b3a4 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 935434 85deac8531b02a0fdf3c9baa21d8e4bd http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 935640 958cb158264f75772864cd5d5c0bf251
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb Size/MD5 checksum: 1423294 f05c7491a8100684c5085588738f05b5 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb Size/MD5 checksum: 833970 cb705c9fe9418cc9348ac935ea7b0ba2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb Size/MD5 checksum: 920070 3df41a0c99c41d1bccf6801011cf8ed5 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb Size/MD5 checksum: 925914 159b4244ef701edbe0fb8c9685b5b477 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb Size/MD5 checksum: 1838900 3b7ac7b8fe0da1a3909ee56aba46d464
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 2205680 6868a56b1db04627e6921bf7237939a2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 970440 783f0cccabfbcc63590730b3803d164d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 2281114 fd04b505755a3aed0fe4c9baaac84500 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 842690 9f9ca89c3d3ba7c46481e9cd39c242a6 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 962854 c8a32f808d719357a5b6350e2b60794e
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb Size/MD5 checksum: 895414 5dd919d188291cb3727d39b5e06c9e26 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb Size/MD5 checksum: 927342 28c245db4d8ea82ba4075b27d674d72a http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb Size/MD5 checksum: 833182 0e0b21e13d77de82bed7a38d30f65e4b http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb Size/MD5 checksum: 1769524 24bdc73a3d20c4046c7741957442c713 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb Size/MD5 checksum: 1717562 977ae5c34a127d32d8f2bf222de9a431
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 1755032 cab5c112911465a9ce23a0d2ea44ded9 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 926616 2bf14a3fe74d9f2a523aacc8b04f5282 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 895194 b7c9ed37bf83ad92371f5472ac5d917b http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 833098 08b63ba6c3becf25ba2f941a532a7b71 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 1720642 1ff7568eb478edee923edb76cf42e9ac
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 941434 bbac9384bd7f88339e2b86fa665208c1 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 835212 4790d79f8de7f1bee7aabf0473f25268 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 1657890 b91fcf52e80c7196cea0c13df9ac79ef http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 1803262 4d298c9509941390c7b2eb68320ad211 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 928170 b17966a6a61313344ac827b58f32eeef
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb Size/MD5 checksum: 1409718 2a128cbdce2522ef49604255cff41af2 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb Size/MD5 checksum: 931452 d3bb7c3a849cd2b35fa6e4acb19c318d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb Size/MD5 checksum: 1834914 67e5b946df18b06b41b3e108d5ddc4e3 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb Size/MD5 checksum: 836102 7a4b85e8ea0e50d7213997b5f7d6309f http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb Size/MD5 checksum: 903864 3f80e78e4e2672aacf3da0690ff24b79
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 925336 5824ea607689f3f1bd62a9e6e28f95ae http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 1548630 1378d1cf730d3026bc1f01a4ab2ccedb http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 918592 28a086f6aa2ee8d510b38c1a177843fc http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 834186 068cbf2b4774ecf9504b820db26e6f1d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 1782014 d39fae5fe0d1397a2a1bd7397d6e850a
These files will probably be moved into the stable distribution on its next update. Summary
Updated ESX packages for OpenSSL, net-snmp, perl.
- Relevant releases
ESX 3.0.2 ESX 3.0.1
Extended Support (Security and Bug fixes) for ESX 3.0.1 has ended on 2008-07-31. Users should plan to upgrade to at least 3.0.2 update 1 and preferably the newest release available.
- Problem Description
I Security Issues
a. OpenSSL Binaries Updated
This fix updates the third party OpenSSL library.
VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows affected, patch pending
hosted * any any for patch info see VMSA-2008-0005
ESXi 3.5 ESXi affected, patch pending
ESX 3.5 ESX for patch info see VMSA-2008-0001 ESX 3.0.3 ESX not affected ESX 3.0.2 ESX affected, patch pending ESX 3.0.1 ESX affected, patch pending ESX 2.5.5 ESX for patch info see VMSA-2008-0001 ESX 2.5.4 ESX for patch info see VMSA-2008-0001
- hosted products are VMware Workstation, Player, ACE, Server, Fusion
II Service Console rpm updates
a. net-snmp Security update
This fix upgrades the service console rpm for net-snmp to version net-snmp-5.0.9-2.30E.24.
VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not applicable
hosted * any any not applicable
ESXi 3.5 ESXi not applicable
ESX 3.5 ESX affected, patch pending ESX 3.0.3 ESX not affected ESX 3.0.2 ESX affected, patch pending ESX 3.0.1 ESX affected, patch pending ESX 2.5.5 ESX not affected ESX 2.5.4 ESX not affected
- hosted products are VMware Workstation, Player, ACE, Server, Fusion
b. perl Security update
This fix upgrades the service console rpm for perl to version perl-5.8.0-98.EL3.
VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not applicable
hosted * any any not applicable
ESXi 3.5 ESXi not applicable
ESX 3.5 ESX affected, patch pending ESX 3.0.3 ESX not affected ESX 3.0.2 ESX affected, patch pending ESX 3.0.1 ESX affected, patch pending ESX 2.5.5 ESX not affected ESX 2.5.4 ESX not affected
-
hosted products are VMware Workstation, Player, ACE, Server, Fusion
-
Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
ESX
ESX 3.0.3 build 104629 ESX Server 3.0.3 CD image md5sum: c2cda9242c6981c7eba1004e8fc5626d Upgrade package from ESX Server 2.x to ESX Server 3.0.3 md5sum: 0ad8fa4707915139d8b2343afebeb92b Upgrade package from earlier releases of ESX Server 3 to ESX Server 3.0.3 md5sum: ff7f3dc12d34b474b231212bdf314113 release notes: http://www.vmware.com/support/vi3/doc/releasenotes_esx303.html
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927
- Change log
2008-08-12 VMSA-2008-0013
Initial release following release of ESX 3.0.3.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. All rights reserved. An attacker could exploit this flaw to spoof an authenticated SNMPv3 packet (CVE-2008-0960).
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292
Updated Packages:
Mandriva Linux 2007.1: 8db66ef5a5468d3fd72a47855230a28e 2007.1/i586/libnet-snmp10-5.3.1-3.2mdv2007.1.i586.rpm c951b17138ef11828b2ccf031d4cddaf 2007.1/i586/libnet-snmp10-devel-5.3.1-3.2mdv2007.1.i586.rpm 536a87919f32fac81964d0a907bf08fe 2007.1/i586/libnet-snmp10-static-devel-5.3.1-3.2mdv2007.1.i586.rpm 39e33947c21666dac5dbe5cfe103b26d 2007.1/i586/net-snmp-5.3.1-3.2mdv2007.1.i586.rpm 1eed5ebaff8f6f83befbf8d831900073 2007.1/i586/net-snmp-mibs-5.3.1-3.2mdv2007.1.i586.rpm 874db03c69584025e4d91049072d3c4e 2007.1/i586/net-snmp-trapd-5.3.1-3.2mdv2007.1.i586.rpm 11af93c879d8cd9353b7cb1826900222 2007.1/i586/net-snmp-utils-5.3.1-3.2mdv2007.1.i586.rpm 2c9e819eeb5fd472f6a0fe338d86182b 2007.1/i586/perl-NetSNMP-5.3.1-3.2mdv2007.1.i586.rpm 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64: aa27de502ce22110fd745c0b847b79d9 2007.1/x86_64/lib64net-snmp10-5.3.1-3.2mdv2007.1.x86_64.rpm 1843dd154c443cca9ae977e502221d6d 2007.1/x86_64/lib64net-snmp10-devel-5.3.1-3.2mdv2007.1.x86_64.rpm 838bd7820d446bd947bc46e090b38066 2007.1/x86_64/lib64net-snmp10-static-devel-5.3.1-3.2mdv2007.1.x86_64.rpm e659d3df04816330c7bf45008f66bc27 2007.1/x86_64/net-snmp-5.3.1-3.2mdv2007.1.x86_64.rpm 756d5606a1039d20a7512b0a109d53bb 2007.1/x86_64/net-snmp-mibs-5.3.1-3.2mdv2007.1.x86_64.rpm 8ad36943e07362865f3a48c99914e48c 2007.1/x86_64/net-snmp-trapd-5.3.1-3.2mdv2007.1.x86_64.rpm 483140c06017507127d12357c3ed2b41 2007.1/x86_64/net-snmp-utils-5.3.1-3.2mdv2007.1.x86_64.rpm e2bb901815ffa1ca5b0a16bc1363f84f 2007.1/x86_64/perl-NetSNMP-5.3.1-3.2mdv2007.1.x86_64.rpm 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm
Mandriva Linux 2008.0: 8de3c4975620db2b2c2697d6f9deb79b 2008.0/i586/libnet-snmp15-5.4.1-1.1mdv2008.0.i586.rpm b1991c58d996f4be200fe141e28c5f7d 2008.0/i586/libnet-snmp-devel-5.4.1-1.1mdv2008.0.i586.rpm 03c54182cc7f97633f29ff0251a8c898 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.1mdv2008.0.i586.rpm 1f792de19b7b38b56d68242958d5d800 2008.0/i586/net-snmp-5.4.1-1.1mdv2008.0.i586.rpm e3362a641e232a6ecf0b8230f0e49ec8 2008.0/i586/net-snmp-mibs-5.4.1-1.1mdv2008.0.i586.rpm bc6d8c10135ea64a4d512d80d04b1b39 2008.0/i586/net-snmp-trapd-5.4.1-1.1mdv2008.0.i586.rpm 8e7f28ee85fb48129eea57d11d391c8b 2008.0/i586/net-snmp-utils-5.4.1-1.1mdv2008.0.i586.rpm beab129e378f61a6bf62d366a4d90639 2008.0/i586/perl-NetSNMP-5.4.1-1.1mdv2008.0.i586.rpm 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 82b570c9cb7e0662df4d7da730c131db 2008.0/x86_64/lib64net-snmp15-5.4.1-1.1mdv2008.0.x86_64.rpm 20b8a6e3fc8dd82fe5ecfdb337553938 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.1mdv2008.0.x86_64.rpm 555688caa0eee850b3a5f835a5778849 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.1mdv2008.0.x86_64.rpm 60d65f80aec29dcb6d4ceb4bb117a9bc 2008.0/x86_64/net-snmp-5.4.1-1.1mdv2008.0.x86_64.rpm 685c9dd25b585afc128de1b3c092e5d5 2008.0/x86_64/net-snmp-mibs-5.4.1-1.1mdv2008.0.x86_64.rpm 7bff860904572c092f737ac17940d5b2 2008.0/x86_64/net-snmp-trapd-5.4.1-1.1mdv2008.0.x86_64.rpm e434686bddfb04f2a8bd01346517ecb4 2008.0/x86_64/net-snmp-utils-5.4.1-1.1mdv2008.0.x86_64.rpm 4fab6e498e1f05809db500ce895aad66 2008.0/x86_64/perl-NetSNMP-5.4.1-1.1mdv2008.0.x86_64.rpm 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.1: 4bafceae1a29f6557b5aa884eca24ba0 2008.1/i586/libnet-snmp15-5.4.1-5.1mdv2008.1.i586.rpm 1eedbae5df7e503de1cba736129beaa1 2008.1/i586/libnet-snmp-devel-5.4.1-5.1mdv2008.1.i586.rpm 615a88847cbf1ce6eaf0029037a14b1b 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.1mdv2008.1.i586.rpm 7323cb7d35eb67664d40ad73b413679d 2008.1/i586/net-snmp-5.4.1-5.1mdv2008.1.i586.rpm d43ed96a806639a94af2a137c75e276e 2008.1/i586/net-snmp-mibs-5.4.1-5.1mdv2008.1.i586.rpm 7394b1361b43056b5eb99827771358cf 2008.1/i586/net-snmp-tkmib-5.4.1-5.1mdv2008.1.i586.rpm 8d6fd9308c2edbe8c020d2c33b3a841d 2008.1/i586/net-snmp-trapd-5.4.1-5.1mdv2008.1.i586.rpm dc58047a02e1a222af20aa794ea8f447 2008.1/i586/net-snmp-utils-5.4.1-5.1mdv2008.1.i586.rpm 2ad9888cd61fc4952c1cee0c48f714b5 2008.1/i586/perl-NetSNMP-5.4.1-5.1mdv2008.1.i586.rpm 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: 618c241e0ecb57685646264c9bb083b4 2008.1/x86_64/lib64net-snmp15-5.4.1-5.1mdv2008.1.x86_64.rpm bb0ebf49ee7cca29965aeb398f4725f6 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.1mdv2008.1.x86_64.rpm b4f29f00773291f6cc00784ed7cde470 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.1mdv2008.1.x86_64.rpm 3039811b6682dc4009b32ff48a99eb2b 2008.1/x86_64/net-snmp-5.4.1-5.1mdv2008.1.x86_64.rpm fab09178635501eb5d6a82eb7bd532a3 2008.1/x86_64/net-snmp-mibs-5.4.1-5.1mdv2008.1.x86_64.rpm da29d4c7edaa15d95f8bee98dbfab025 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.1mdv2008.1.x86_64.rpm d9aad834d82d310c64f6f21e17a55920 2008.1/x86_64/net-snmp-trapd-5.4.1-5.1mdv2008.1.x86_64.rpm 7a7c871bd87dc91c16b046ac115cda70 2008.1/x86_64/net-snmp-utils-5.4.1-5.1mdv2008.1.x86_64.rpm d102ea2af0fcaaebd98defda72bcfc91 2008.1/x86_64/perl-NetSNMP-5.4.1-5.1mdv2008.1.x86_64.rpm 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm
Corporate 3.0: 335af3930865c8eb44ef436cad5fb373 corporate/3.0/i586/libnet-snmp5-5.1-7.4.C30mdk.i586.rpm b8e1d307ee6fa3905d292077fc063318 corporate/3.0/i586/libnet-snmp5-devel-5.1-7.4.C30mdk.i586.rpm a668cc4de411865567d1a93f34cee1e3 corporate/3.0/i586/libnet-snmp5-static-devel-5.1-7.4.C30mdk.i586.rpm d8c0d342b03e5719443d2de06c631bd5 corporate/3.0/i586/libsnmp0-4.2.3-8.2.C30mdk.i586.rpm 6bbe3bb2502ce3c974f7b5737331bb4d corporate/3.0/i586/libsnmp0-devel-4.2.3-8.2.C30mdk.i586.rpm daca10f2e578f75c1e7415d78ed30265 corporate/3.0/i586/net-snmp-5.1-7.4.C30mdk.i586.rpm 1630ebd75201e1bc3956b12a26282f92 corporate/3.0/i586/net-snmp-mibs-5.1-7.4.C30mdk.i586.rpm 5a4f483c877a6278088a265cb3273d61 corporate/3.0/i586/net-snmp-trapd-5.1-7.4.C30mdk.i586.rpm 316d866de7fa7cd984d58f5cb742f5e3 corporate/3.0/i586/net-snmp-utils-5.1-7.4.C30mdk.i586.rpm e3d4197517565f12e2c3a8fd1cc5d2e7 corporate/3.0/i586/ucd-snmp-4.2.3-8.2.C30mdk.i586.rpm 17e8d856fd1dac18552818a842105c88 corporate/3.0/i586/ucd-snmp-utils-4.2.3-8.2.C30mdk.i586.rpm ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm
Corporate 3.0/X86_64: b31f277942fca76d953007c94a60cae2 corporate/3.0/x86_64/lib64net-snmp5-5.1-7.4.C30mdk.x86_64.rpm e4a3fba10ccdd805dc8783ae68c99a42 corporate/3.0/x86_64/lib64net-snmp5-devel-5.1-7.4.C30mdk.x86_64.rpm 530a94cc87af0e4d6e9f3815473c0dd4 corporate/3.0/x86_64/lib64net-snmp5-static-devel-5.1-7.4.C30mdk.x86_64.rpm f246ca421b5d16c599d53f70e4b97660 corporate/3.0/x86_64/lib64snmp0-4.2.3-8.2.C30mdk.x86_64.rpm b943e07726a2fecb016ef4ba626906d8 corporate/3.0/x86_64/lib64snmp0-devel-4.2.3-8.2.C30mdk.x86_64.rpm 22822876f72e35cf6d1ed027df93e74a corporate/3.0/x86_64/net-snmp-5.1-7.4.C30mdk.x86_64.rpm e7e51782b9bbd1e1bdf93c17fb953280 corporate/3.0/x86_64/net-snmp-mibs-5.1-7.4.C30mdk.x86_64.rpm e67a9105f9492c020693d48ce55652ea corporate/3.0/x86_64/net-snmp-trapd-5.1-7.4.C30mdk.x86_64.rpm 171a17e507b2dfdb9c70c0089e582221 corporate/3.0/x86_64/net-snmp-utils-5.1-7.4.C30mdk.x86_64.rpm 96886146d21175b076e92d59e96f5016 corporate/3.0/x86_64/ucd-snmp-4.2.3-8.2.C30mdk.x86_64.rpm 1b6ee4c253f15be516a1928a4f791f15 corporate/3.0/x86_64/ucd-snmp-utils-4.2.3-8.2.C30mdk.x86_64.rpm ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm
Corporate 4.0: 6cbe9d76db3b05c2435bcbc5cf16c898 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.2.20060mlcs4.i586.rpm 586a55cfde45020d5ea0ebf5f2d6c840 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm d992d8300cf0639942a179349d592e15 corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm 03a49b848c376b705dcfcef0ec817daf corporate/4.0/i586/net-snmp-5.2.1.2-5.2.20060mlcs4.i586.rpm 22b9d01b3b7a8a34ed3e1a5a435286a8 corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.i586.rpm dccc01a94c1f29eac2875e6a935bf589 corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.i586.rpm 77f93230f96abce039b52ca5612eaa36 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.i586.rpm 8a7209b70979c9d73035ff40cbd8dbb4 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.i586.rpm ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm
Corporate 4.0/X86_64: f94c7e967973ba8aa12b5605251d6e78 corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.2.20060mlcs4.x86_64.rpm f332985986eff2d6c8a75b5c263dedb1 corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 82fc454916e75866370ee738292021c8 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm ff0adeb23df57eb34869c7100df159da corporate/4.0/x86_64/net-snmp-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 72f2dc9cb1695999660a9ff9c97e4c47 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 0f244551c87e051a8274e5050cf0bc2a corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 7c4e7fb304c77c6551a50495d338e84e corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 68d81ca4c173710ef43b36092df2a6ee corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.x86_64.rpm ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm
Multi Network Firewall 2.0: f98286a301d580fe306917cf0169ef88 mnf/2.0/i586/libnet-snmp5-5.1-7.4.M20mdk.i586.rpm 3ba27516773b1dd933828207cecc7754 mnf/2.0/SRPMS/net-snmp-5.1-7.4.M20mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIW/O7mqjQ0CJFipgRAlNDAJwKuG+ljPAS2MDqj4QOlf+2PtWFUQCeIlun Kcp+qeLAEA/HEE8HXT88NkY= =D9Hu -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200806-0575",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios xr",
"scope": null,
"trust": 1.1,
"vendor": "cisco",
"version": null
},
{
"model": "src pe",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "2.0"
},
{
"model": "src pe",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "1.0"
},
{
"model": "session and resource control",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "2.0"
},
{
"model": "session and resource control",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "1.0"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "extreme",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "global associates",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "network appliance",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "snmp research",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "sun microsystems",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ecoscentric",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "netsnmp",
"version": null
},
{
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.2.4.1"
},
{
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.3.2.1"
},
{
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.4.1.1"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "10.5.4"
},
{
"model": "mac os x server",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "10.5.4"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9424t/sp"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9424t/sp-e"
},
{
"model": "centrecom",
"scope": "eq",
"trust": 0.8,
"vendor": "allied telesis",
"version": "9424ts/xp-e"
},
{
"model": "switchblade 5400s series",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"model": "switchblade 7800r series",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"model": "switchblade 7800s series",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"model": "switchblade x908",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"model": "x900-12xt/s",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"model": "x900-24xs",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"model": "x900-24xt",
"scope": null,
"trust": 0.8,
"vendor": "allied telesis",
"version": null
},
{
"model": "ax2400s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"model": "ax3600s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"model": "ax5400s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"model": "ax6300s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"model": "ax6700s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"model": "ax7700r series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"model": "ax7800r series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"model": "ax7800s series",
"scope": null,
"trust": 0.8,
"vendor": "alaxala",
"version": null
},
{
"model": "seil/neu",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "128 2.00 to 2.42"
},
{
"model": "seil/plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 1.91"
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 1.91"
},
{
"model": "seil/x1,x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 1.20"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "2.1"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86-64)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0 (x86-64)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(sparc)"
},
{
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(x86)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (sparc)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (x86)"
},
{
"model": "catos",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "8.x"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "12.4"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (server)"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.0 (client)"
},
{
"model": "linux advanced workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "2.1"
},
{
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (client)"
},
{
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "r400 series (ax7800r series"
},
{
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "ax7700r series )"
},
{
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s2400 series (ax2400s series )"
},
{
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s3600 series (ax3600s series )"
},
{
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s400 series (ax7800s series )"
},
{
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s6300 series (ax6300s series )"
},
{
"model": "ip8800/s,/r",
"scope": "eq",
"trust": 0.8,
"vendor": "nec",
"version": "s6700 series (ax6700s series )"
},
{
"model": "gr4000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": "gs3000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": "gs4000",
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": "ipcom series",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.6,
"vendor": "sun",
"version": "10.0"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.3"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.2"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.0.1"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.58"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.56"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.54"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.52"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.5"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.45"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.43"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.419"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.417"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.416"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.415"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.413"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.410"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.41"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.4"
},
{
"model": "esx server",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "3.5"
},
{
"model": "esx server patch",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.55"
},
{
"model": "ucd-snmp",
"scope": "eq",
"trust": 0.3,
"vendor": "ucd snmp",
"version": "4.2.6"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux lts lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.10"
},
{
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "9"
},
{
"model": "linux enterprise server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux enterprise server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux enterprise sdk 10.sp1",
"scope": null,
"trust": 0.3,
"vendor": "suse",
"version": null
},
{
"model": "linux enterprise sdk sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux enterprise desktop sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux enterprise desktop sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "solaris 10 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "solaris 10 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "opensolaris build snv 01",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"model": "opensolaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.0"
},
{
"model": "linux -current",
"scope": null,
"trust": 0.3,
"vendor": "slackware",
"version": null
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "11.0"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.3"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.2"
},
{
"model": "open-enterprise-server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "0"
},
{
"model": "novell linux pos",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9"
},
{
"model": "novell linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"model": "fedora",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "enterprise linux desktop workstation client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "enterprise linux desktop version",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4.0"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3.0"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "6600"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "6400"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "6000"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5700"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5600"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5400"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5300"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5100"
},
{
"model": "networks switched firewall series",
"scope": "eq",
"trust": 0.3,
"vendor": "nortel",
"version": "5000"
},
{
"model": "net-snmp",
"scope": "eq",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.4.1"
},
{
"model": "net-snmp",
"scope": "eq",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.3.2"
},
{
"model": "net-snmp",
"scope": "eq",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.2.4"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.1"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.1"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"model": "multi network firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "2.0"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "session and resource control appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "2.0"
},
{
"model": "session and resource control appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "1.0.1"
},
{
"model": "session and resource control appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "1.0"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.4"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.1"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.5.2"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.5.1"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.4.1"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.4"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.3"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.2"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.1"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.3"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.2"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.1"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.3.1"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.2.1"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.2"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.1"
},
{
"model": "siparator",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.4"
},
{
"model": "firewalll",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.4"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.4"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6.1"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.6"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.5.2"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.5.1"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.4.1"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.4"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.3"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.2"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3.1"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.3"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.3"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.2"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.2.1"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "4.1.3"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.3.1"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.2.1"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.2"
},
{
"model": "firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "ingate",
"version": "3.1"
},
{
"model": "openview snmp emanate master agent",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "15"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "ecos",
"scope": "eq",
"trust": 0.3,
"vendor": "ecoscentric",
"version": "0"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "wireless lan controller module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1"
},
{
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0"
},
{
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.1"
},
{
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0"
},
{
"model": "wireless lan control",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3.2"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.19"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.18"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.17"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.13"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.9"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.7"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "nx-os",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "mds",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "9000"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "catos",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "application control engine module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.5.11"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.5.7"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.3.3"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.7"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.3.9"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.1.7"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.15"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.13.7"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.11.6"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1.9"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.17.6"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.5"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.3"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.11"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.9"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2.7"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.2"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.1.3"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.1.1"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "4.0.3"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.2.0"
},
{
"model": "application \u0026 content networking software",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "application \u0026 content networking software",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "ace xml gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "ace appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "messaging storage server mm3.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.0"
},
{
"model": "messaging storage server",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "message networking mn",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"model": "message networking",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "intuity audix r5",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "0"
},
{
"model": "intuity audix lx",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "intuity audix",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "interactive response",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.0"
},
{
"model": "interactive response",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "emmc",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.021"
},
{
"model": "emmc",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.017"
},
{
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.0"
},
{
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1.1"
},
{
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1.5"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "esx server patch",
"scope": "ne",
"trust": 0.3,
"vendor": "vmware",
"version": "2.5.510"
},
{
"model": "net-snmp",
"scope": "ne",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.4.1.1"
},
{
"model": "net-snmp",
"scope": "ne",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.3.2.1"
},
{
"model": "net-snmp",
"scope": "ne",
"trust": 0.3,
"vendor": "net snmp",
"version": "5.2.4.1"
},
{
"model": "siparator",
"scope": "ne",
"trust": 0.3,
"vendor": "ingate",
"version": "4.7.1"
},
{
"model": "firewall",
"scope": "ne",
"trust": 0.3,
"vendor": "ingate",
"version": "4.7.1"
},
{
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:net-snmp:net-snmp",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:centrecom",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_5400s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_7800r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_7800s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_x908",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:x900-12xts",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:x900-24xs",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:allied_telesis_k.k.:x900-24xt",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax2400s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax3600s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax5400s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax6300s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax6700s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7700r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7800r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:alaxala:ax7800s",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:sun:opensolaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:sun:solaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:catos",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:ios",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:ios_xr",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:nec:ip8800_s_r",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gr4000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gs3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hitachi:gs4000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:fujitsu:ipcom",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Wes Hardaker",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
}
],
"trust": 0.6
},
"cve": "CVE-2008-0960",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2008-0960",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-31085",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2008-0960",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#878044",
"trust": 0.8,
"value": "7.56"
},
{
"author": "NVD",
"id": "CVE-2008-0960",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200806-140",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-31085",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2008-0960",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. SNMPv3 The implementation of contains an authentication bypass vulnerability because it does not properly handle crafted packets. SNMP (Simple Network Management Protocol) Is a widely used protocol for monitoring and managing network devices. SNMPv3 Supports security features such as authentication and privacy control. SNMPv3 In the authentication of HMAC (keyed-Hash Message Authentication Code) Is used. This code is generated by combining a private key and a cryptographic hash function. SNMPv3 Depending on the implementation of, there is a possibility that authentication may be bypassed by processing specially crafted packets due to vulnerability in authentication processing.By remote third party SNMP The object may be read or modified. Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error. \nSuccessfully exploiting this issue will allow attackers to gain unauthorized access to the affected application. \nNet-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. An attacker could exploit this vulnerability to read and modify any SNMP object accessible using the authenticated credentials logged into the system. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nCisco Security Advisory: SNMP Version 3 Authentication\nVulnerabilities\n\nDocument ID: 107408\n\nAdvisory ID: cisco-sa-20080610-snmpv3\n\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\n\nRevision 1.0\n\nFor Public Release 2008 June 10 1600 UTC (GMT)\n\n- ---------------------------------------------------------------------\n\nSummary\n=======\n\nMultiple Cisco products contain either of two authentication\nvulnerabilities in the Simple Network Management Protocol version 3\n(SNMPv3) feature. These vulnerabilities can be exploited when\nprocessing a malformed SNMPv3 message. These vulnerabilities could\nallow the disclosure of network information or may enable an attacker\nto perform configuration changes to vulnerable devices. The SNMP\nserver is an optional service that is disabled by default in Cisco\nproducts. Only SNMPv3 is impacted by these vulnerabilities. \nWorkarounds are available for mitigating the impact of the\nvulnerabilities described in this document. \n\nThe United States Computer Emergency Response Team (US-CERT) has\nassigned Vulnerability Note VU#878044 to these vulnerabilities. \n\nCommon Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960\nhas also been assigned to these vulnerabilities. \n\nThis advisory is posted at\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\n\nAffected Products\n=================\n\nVulnerable Products\n+------------------\n\nThe following Cisco products are vulnerable. \n\n * Cisco IOS\n * Cisco IOS-XR\n * Cisco Catalyst Operating System (CatOS)\n * Cisco NX-OS\n * Cisco Application Control Engine (ACE) Module\n * Cisco ACE Appliance\n * Cisco ACE XML Gateway\n * Cisco MDS 9000 Series Multilayer Fabric Switches\n\nNote: The SNMP server is disabled by default. These vulnerabilities\nonly impact devices that are configured for SNMPv3. \n\nTo determine the version of SNMP configured in Cisco IOS, CatOS and\nIOS-XR, log in to the device and issue the show snmp group command. \nThe security model field indicates the version of SNMP configured. \nThe output \"usm\" is the abbreviation for user-based security model\nand this indicates SNMPv3 is configured. \n\n Cisco IOS\n router#show snmp group\n groupname: test security model:v3 noauth \n readview : v1default writeview: \u003cno writeview specified\u003e \n notifyview: \u003cno notifyview specified\u003e \n row status: active\n \n Cisco CatOS\n 5500-1 (enable) show snmp group\n Security Model: v3\n Security Name: userv3\n Group Name: groupv3\n Storage Type: nonvolatile\n Row Status: active\n \n Cisco IOS-XR\n RP/0/RP0/CPU0:ios#show snmp group\n groupname: test security model:usm\n readview : v1default writeview: -\n notifyview: v1default\n row status: nonVolatile \n \n\nIronPort\n+-------\n\nIronPort C-Series, X-Series, and M-Series appliances utilize code\ncovered by this advisory, but are not susceptible to any security\nrisk. IronPort C-Series, X-Series, and M-Series incorporate the\nlibraries under the advisory to provide anonymous read-only access to\nsystem health data. There is no risk of escalated authorization\nprivileges allowing a 3rd party to make any configuration changes to\nthe IronPort devices. IronPort S-Series and Encryption Appliances are\nnot affected by this advisory. This announcement has also been posted\non the IronPort Support Portal, available to IronPort customers: \n\nhttps://supportportal.ironport.com/irppcnctr/srvcd?u=http://secure-support.soma.ironport.com/announcement\u0026sid=900016 \n\nProducts Confirmed Not Vulnerable\n+--------------------------------\n\nThe following Cisco products are confirmed not vulnerable:\n\n * Cisco PIX Security Appliances\n * Cisco ASA Security Appliances\n * Cisco Firewall Services Module (FWSM)\n * Cisco Security Monitoring, Analysis, and Response System (MARS)\n * Cisco Network Admission Control (NAC) Appliance\n * CiscoWorks Wireless LAN Solution Engine (WLSE)\n\nNo other Cisco products are currently known to be affected by these\nvulnerabilities. \n\nThere are three general types of SNMP operations: \"get\" requests to\nrequest information, \"set\" requests that modify the configuration of\na remote device, and \"trap\" messages that provide a monitoring\nfunction. SNMP requests and traps are transported over User Datagram\nProtocol (UDP) and are received at the assigned destination port\nnumbers 161 and 162, respectively. \n\nSNMPv3 provides secure access to devices by authenticating and\nencrypting packets over the network. RFC2574 defines\nthe use of HMAC-MD5-96 and HMAC-SHA-96 as the possible authentication\nprotocols for SNMPv3. This advisory identifies two\nvulnerabilities that are almost identical. Both are specifically\nrelated to malformed SNMPv3 packets that manipulate the Hash Message\nAuthentication Code (HMAC). The two vulnerabilities may impact both\nSecure Hashing Algorithm-1 (SHA-1) and Message-Digest Algorithm 5\n(MD5). The vulnerabilities described in this document can be\nsuccessfully exploited using spoofed SNMPv3 packets. \n\nThese vulnerabilities are documented in the following Cisco Bug IDs:\n\n * CSCsf04754 - IOS SNMPv3 HMAC Authentication issue \n * CSCsf30109 - IOS-XR SNMPv3 HMAC Authentication issue \n * CSCsf29976 - CatOS SNMPv3 HMAC Authentication issue \n * CSCsq62662 - ACE XML Gw SNMPv3 HMAC Authentication issue\n * CSCsq60664 - ACE Appliance SNMPv3 HMAC Authentication issue\n * CSCsq60695 - ACE Module SNMPv3 HMAC Authentication issue\n * CSCsq60582 - Nexus SNMPv3 HMAC Authentication issue\n\nNote: Although multiple software defects are listed, this advisory\nonly identifies two vulnerabilities. Because different Cisco products\nrequire their own fixes, additional Bug IDs have been assigned. \n\nVulnerability Scoring Details\n=============================\n\nCisco has provided scores for the vulnerabilities in this advisory\nbased on the Common Vulnerability Scoring System (CVSS). The CVSS\nscoring in this Security Advisory is done in accordance with CVSS\nversion 2.0. \n\nCVSS is a standards-based scoring method that conveys vulnerability\nseverity and helps determine urgency and priority of response. \n\nCisco has provided a base and temporal score. Customers can then\ncompute environmental scores to assist in determining the impact of\nthe vulnerability in individual networks. \n\nCisco has provided an FAQ to answer additional questions regarding\nCVSS at\n\nhttp://www.cisco.com/web/about/security/intelligence/cvss-qandas.html\n\nCisco has also provided a CVSS calculator to help compute the\nenvironmental impact for individual networks at\n\nhttp://intellishield.cisco.com/security/alertmanager/cvss\n\nCSCsf04754 - IOS SNMPv3 HMAC Authentication issue\n- -----------------------------------------------------\n\nCVSS Base Score - 10\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Low\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.3\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Official-Fix\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsf30109 - IOS-XR SNMPv3 HMAC Authentication issue\n- --------------------------------------------------------\n\nCVSS Base Score - 10\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Low\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.3\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Official-Fix\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsf29976 - CatOS SNMPv3 HMAC Authentication issue\n- -------------------------------------------------------\n\nCVSS Base Score - 10\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Low\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.3\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Official-Fix\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsq62662 - ACE XML Gw SNMPv3 HMAC Authentication issue\n- ------------------------------------------------------------\n\nCVSS Base Score - 9.3\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Medium\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 7.7\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Official-Fix\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsq60664 - ACE Appliance SNMPv3 HMAC Authentication issue\n- ---------------------------------------------------------------\n\nCVSS Base Score - 9.3\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Medium\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.4\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Workaround\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsq60695 - ACE Module SNMPv3 HMAC Authentication issue\n- ------------------------------------------------------------\n\nCVSS Base Score - 9.3\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Medium\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.4\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Workaround\n\tReport Confidence\t - Confirmed\n\n\n\nCSCsq60582 - Nexus SNMPv3 HMAC Authentication issue\n- -------------------------------------------------------\n\nCVSS Base Score - 9.3\n\n\tAccess Vector\t\t - Network\n\tAccess Complexity\t - Medium\n\tAuthentication\t\t - None\n\tConfidentiality Impact\t - Complete\n\tIntegrity Impact\t - Complete\n\tAvailability Impact\t - Complete\n\nCVSS Temporal Score - 8.4\n\n\tExploitability\t\t - Functional\n\tRemediation Level\t - Workaround\n\tReport Confidence\t - Confirmed\n\n\nImpact\n======\n\nSuccessful exploitation of these vulnerabilities could result in the\ndisclosure of sensitive information on a device or allow an attacker\nto make configuration changes to a vulnerable device that is based on\nthe SNMP configuration. \n\nSoftware Versions and Fixes\n===========================\n\nWhen considering software upgrades, also consult\nhttp://www.cisco.com/go/psirt and any subsequent advisories to\ndetermine exposure and a complete upgrade solution. \n\nIn all cases, customers should exercise caution to be certain the\ndevices to be upgraded contain sufficient memory and that current\nhardware and software configurations will continue to be supported\nproperly by the new release. If the information is not clear, contact\nthe Cisco Technical Assistance Center (TAC) or your contracted\nmaintenance provider for assistance. \n\nEach row of the Cisco IOS software table (below) names a Cisco IOS\nrelease train. If a given release train is vulnerable, then the\nearliest possible releases that contain the fix (along with the\nanticipated date of availability for each, if applicable) are listed\nin the \"First Fixed Release\" column of the table. The \"Recommended\nRelease\" column indicates the releases which have fixes for all the\npublished vulnerabilities at the time of this Advisory. A device\nrunning a release in the given train that is earlier than the release\nin a specific column (less than the First Fixed Release) is known to\nbe vulnerable. Cisco recommends upgrading to a release equal to or\nlater than the release in the \"Recommended Releases\" column of the\ntable. \n\n+---------------------------------------+\n| Affected | Affected | First |\n| Product | Release | Fixed |\n| | | Release |\n|-----------------+----------+----------|\n| | 6.x | 6.4(23) |\n| |----------+----------|\n| Cisco Catalyst | 7.x | 7.6(19) |\n|Operating |----------+----------|\n| System (CatOS) | 8.5.x | 8.5(7) |\n| |----------+----------|\n| | 8.6.x | 8.6(1) |\n+---------------------------------------+\n\nCisco IOS XR\n+-----------\n\nThe following table lists fixed Cisco IOS XR software. \n\n+---------------------------------------------------+\n| Cisco | | |\n| IOS XR | SMU ID | SMU Name |\n| Version | | |\n|---------+------------+----------------------------|\n| 3.2.2 | AA01681 | hfr-base-3.2.2.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.2.3 | AA01682 | hfr-base-3.2.3.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.2.4 | AA01683 | hfr-base-3.2.4.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.2.6 | AA01684 | hfr-base-3.2.6.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.0 | AA01685 | hfr-base-3.3.0.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.0 | AA01690 | c12k-base-3.3.0.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.1 | AA01686 | hfr-base-3.3.1.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.1 | AA01688 | c12k-base-3.3.1.CSCsf30109 |\n|---------+------------+----------------------------|\n| 3.3.2 | Not | Not vulnerable |\n| | vulnerable | |\n|---------+------------+----------------------------|\n| 3.4.x | Not | Not vulnerable |\n| | vulnerable | |\n+---------------------------------------------------+\n\nCisco NX-OS\n+----------\n\nThe following table lists fixed Cisco NX-OS software. \n\n+----------------------------------------+\n| Affected | Affected | First Fixed |\n| Product | Release | Release |\n|-----------+-----------+----------------|\n| Cisco | | 4.0.(2) |\n| NX-OS | 4.0.(1)a | Available June |\n| | | 2008 |\n+----------------------------------------+\n\nCisco ACE Products\n+-----------------\n\nThe following table lists fixed Cisco Application Control Engine\n(ACE) software. \n\n+---------------------------------------+\n| Affected | Affected | First |\n| Product | Release | Fixed |\n| | | Release |\n|----------------+----------+-----------|\n| | 3.0(0)A1 | |\n| Cisco | (6.x) | |\n| Application | | A2(1.1) |\n| Control Engine | A2(1.0) | |\n| (ACE) Module | | |\n| | A2(1.0a) | |\n|----------------+----------+-----------|\n| | A1(7.0) | |\n| | | |\n| Cisco | A1(7.0a) | |\n| Application | | |\n| Control Engine | A1(7.0b) | A1(8.0a) |\n| (ACE) | | |\n| Appliance | A1(7.0c) | |\n| | | |\n| | A1(8.0) | |\n|----------------+----------+-----------|\n| Cisco | 4.x | |\n| Application | | 6.0.1 |\n| Control Engine | 5.x | Available |\n| (ACE) XML | | June 2008 |\n| Gateway | 6.0 | |\n+---------------------------------------+\n\nCisco MDS software\n+-----------------\n\nThe following table lists fixed Cisco MDS Multilayer Switch software. \n\n+---------------------------------------+\n| Affected | Affected | First Fixed |\n| Product | Release | Release |\n|-----------+-----------+---------------|\n| | 2.1 | |\n| Cisco MDS | | 3.4.1 |\n| 9000 | 3.0 | Available |\n| | | June 2008 |\n| | 3.2 | |\n+---------------------------------------+\n\nWorkarounds\n===========\n\nThe following workarounds have been identified for these\nvulnerabilities. \n\nInfrastructure Access Control Lists\n+----------------------------------\n\nAlthough it is often difficult to block traffic that transits a\nnetwork, it is possible to identify traffic that should never be\nallowed to target infrastructure devices and block that traffic at\nthe border of networks. Infrastructure Access Control Lists (iACLs)\nare a network security best practice and should be considered as a\nlong-term addition to good network security as well as a workaround\nfor these specific vulnerabilities. The iACL example below should be\nincluded as part of the deployed infrastructure access-list which\nwill protect all devices with IP addresses in the infrastructure IP\naddress range:\n\nNote: UDP port 161 is applicable for all versions of SNMP. \n\n \n !--- Permit SNMP UDP 161 packets from\n !--- trusted hosts destined to infrastructure addresses. \n \n access-list 150 permit udp TRUSTED_HOSTS MASK INFRASTRUCTURE_ADDRESSES MASK eq 161\n \n !--- Deny SNMP UDP 161 packets from all\n !--- other sources destined to infrastructure addresses. \n \n access-list 150 deny udp any INFRASTRUCTURE_ADDRESSES MASK eq 161\n \n !--- Permit/deny all other Layer 3 and Layer 4 traffic in accordance\n !--- with existing security policies and configurations\n !--- Permit all other traffic to transit the device. \n \n access-list 150 permit ip any anyinterface serial 2/0ip access-group 150 in\n \n\nThe white paper entitled \"Protecting Your Core: Infrastructure\nProtection Access Control Lists\" presents guidelines and recommended\ndeployment techniques for infrastructure protection access lists. \nThis white paper can be obtained at the following link:\nhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801a1a55.shtml\n\nControl Plane Policing\n+---------------------\n\nControl Plane Policing (CoPP) can be used to block untrusted SNMP\naccess to the device. Cisco IOS software releases 12.0S, 12.2SX,\n12.2S, 12.3T, 12.4, and 12.4T support the CoPP feature. CoPP can be\nconfigured on a device to protect the management and control planes\nand minimize the risk and effectiveness of direct infrastructure\nattacks by explicitly permitting only authorized traffic that is sent\nto infrastructure devices in accordance with existing security\npolicies and configurations. The following example, which uses\n192.168.100.1 to represent a trusted host, can be adapted to your\nnetwork. \n\n \n !--- Deny SNMP UDP traffic from trusted hosts to all IP addresses\n !--- configured on all interfaces of the affected device so that\n \n !--- it will be allowed by the CoPP feature\n \n \n access-list 111 deny udp host 192.168.100.1 any eq 161\n \n \n !--- Permit all other SNMP UDP traffic sent to all IP addresses\n !--- configured on all interfaces of the affected device so that it\n !--- will be policed and dropped by the CoPP feature\n \n \n access-list 111 permit udp any any eq 161\n \n \n !--- Permit (Police or Drop)/Deny (Allow) all other Layer3 and Layer4\n !--- traffic in accordance with existing security policies and\n !--- configurations for traffic that is authorized to be sent\n !--- to infrastructure devices\n \n !--- Create a Class-Map for traffic to be policed by\n !--- the CoPP feature\n \n \n class-map match-all drop-snmpv3-class\n match access-group 111\n \n \n !--- Create a Policy-Map that will be applied to the\n !--- Control-Plane of the device. \n \n \n policy-map drop-snmpv3-traffic\n class drop-snmpv3-class\n drop\n \n \n !--- Apply the Policy-Map to the \n !--- Control-Plane of the device\n \n \n control-plane\n service-policy input drop-snmpv3-traffic\n \n\nIn the above CoPP example, the access control list entries (ACEs)\nthat match the potential exploit packets with the \"permit\" action\nresult in these packets being discarded by the policy-map \"drop\"\nfunction, while packets that match the \"deny\" action (not shown) are\nnot affected by the policy-map drop function. \n\nPlease note that the policy-map syntax is different in the 12.2S and\n12.0S Cisco IOS trains:\n\n policy-map drop-snmpv3-traffic\n class drop-snmpv3-class\n police 32000 1500 1500 conform-action drop exceed-action drop\n \n\nAdditional information on the configuration and use of the CoPP\nfeature is available at the following links:\n\nhttp://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6642/prod_white_paper0900aecd804fa16a.html\n\nand \n\nhttp://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gtrtlimt.html\n\nTransit Access Control Lists\n+---------------------------\n\nFilters that deny SNMP packets using UDP port 161 should be deployed\nthroughout the network as part of a Transit Access Control List\n(tACL) policy for protection of traffic that enters the network at\ningress access points. This policy should be configured to protect\nthe network device where the filter is applied and other devices\nbehind it. Filters for SNMP packets that use UDP port 161 should also\nbe deployed in front of vulnerable network devices so that traffic is\nonly allowed from trusted clients. \n\nAdditional information about tACLs is available in \"Transit Access\nControl Lists: Filtering at Your Edge:\"\n\nhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801afc76.shtml\n\nHardening Guide Statement\n+------------------------\n\nCustomers are advised to review the \"Fortifying the Simple Network\nManagement Protocol\" section of the \"Cisco Guide to Harden Cisco IOS\nDevices\" for information on configuring an IOS device for SNMPv3\nauthentication and privacy:\n\nhttp://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml#fortify\n\nCisco IOS authPriv Configuration\n+-------------------------------\n\nEnabling the SNMPv3 privacy subsystem (if it is not already in use)\nis a short-term workaround for users who are unable to upgrade in a\ntimely fashion. This subsystem is used to encrypt SNMPv3 traffic\nusing a shared secret. \n\nIn Cisco IOS, administrators can enable this workaround by using the \nauthPriv SNMPv3 feature. Only Cisco IOS crypto images can run the \nauthPriv feature. \n\nNote: Ensure that the management application supports SNMPv3 \nauthPriv before implementing this feature. \n\nApplied Mitigation Bulletin\n+--------------------------\n\nAdditional mitigation techniques that can be deployed on Cisco devices\nwithin the network are available in the Cisco Applied Intelligence\ncompanion document for this advisory:\nhttp://www.cisco.com/warp/public/707/cisco-amb-20080610-SNMPv3.shtml\n\nObtaining Fixed Software\n========================\n\nCisco has released free software updates that address these\nvulnerabilities. Prior to deploying software, customers should\nconsult their maintenance provider or check the software for feature\nset compatibility and known issues specific to their environment. \n\nCustomers may only install and expect support for the feature sets\nthey have purchased. By installing, downloading, accessing or\notherwise using such software upgrades, customers agree to be bound by\nthe terms of Cisco\u0027s software license terms found at\nhttp://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html\nor as otherwise set forth at Cisco.com Downloads at\nhttp://www.cisco.com/public/sw-center/sw-usingswc.shtml. \n\nDo not contact psirt@cisco.com or security-alert@cisco.com for\nsoftware upgrades. \n\nCustomers with Service Contracts\n+-------------------------------\n\nCustomers with contracts should obtain upgraded software through\ntheir regular update channels. For most customers, this means that\nupgrades should be obtained through the Software Center on Cisco\u0027s\nworldwide website at http://www.cisco.com. \n\nCustomers using Third Party Support Organizations\n+------------------------------------------------\n\nCustomers whose Cisco products are provided or maintained through\nprior or existing agreements with third-party support organizations,\nsuch as Cisco Partners, authorized resellers, or service providers\nshould contact that support organization for guidance and assistance\nwith the appropriate course of action in regards to this advisory. \n\nThe effectiveness of any workaround or fix is dependent on specific\ncustomer situations, such as product mix, network topology, traffic\nbehavior, and organizational mission. Due to the variety of affected\nproducts and releases, customers should consult with their service\nprovider or support organization to ensure any applied workaround or\nfix is the most appropriate for use in the intended network before it\nis deployed. \n\nCustomers without Service Contracts\n+----------------------------------\n\nCustomers who purchase direct from Cisco but do not hold a Cisco\nservice contract, and customers who purchase through third-party\nvendors but are unsuccessful in obtaining fixed software through\ntheir point of sale should acquire upgrades by contacting the Cisco\nTechnical Assistance Center (TAC). TAC contacts are as follows. \n\n * +1 800 553 2447 (toll free from within North America)\n * +1 408 526 7209 (toll call from anywhere in the world)\n * e-mail: tac@cisco.com\n\nCustomers should have their product serial number available and be\nprepared to give the URL of this notice as evidence of entitlement to\na free upgrade. Free upgrades for non-contract customers must be\nrequested through the TAC. \n\nRefer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml\nfor additional TAC contact information, including localized telephone\nnumbers, and instructions and e-mail addresses for use in various\nlanguages. \n\nExploitation and Public Announcements\n=====================================\n\nCisco is releasing this combined Cisco IOS and non-IOS product\nadvisory out of our normal bi-yearly IOS security advisory cycle due\nto public disclosure of these vulnerabilities. \n\nCisco is not aware of any malicious exploitation of these\nvulnerabilities. \n\nThese vulnerabilities were reported to Cisco by Dr. Tom Dunigan of\nthe University of Tennessee and Net-SNMP in cooperation with the CERT\nCoordination Center. \n\nStatus of this Notice: FINAL\n============================\n\nTHIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY\nKIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF\nMERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE\nINFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS\nAT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS\nDOCUMENT AT ANY TIME. \n\nA stand-alone copy or Paraphrase of the text of this document that\nomits the distribution URL in the following section is an\nuncontrolled copy, and may lack important information or contain\nfactual errors. \n\nDistribution\n============\n\nThis advisory is posted on Cisco\u0027s worldwide website at :\n\nhttp://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml\n\nIn addition to worldwide web posting, a text version of this notice\nis clear-signed with the Cisco PSIRT PGP key and is posted to the\nfollowing e-mail and Usenet news recipients. \n\n * cust-security-announce@cisco.com\n * first-teams@first.org\n * bugtraq@securityfocus.com\n * vulnwatch@vulnwatch.org\n * cisco@spot.colorado.edu\n * cisco-nsp@puck.nether.net\n * full-disclosure@lists.grok.org.uk\n * comp.dcom.sys.cisco@newsgate.cisco.com\n\nFuture updates of this advisory, if any, will be placed on Cisco\u0027s\nworldwide website, but may or may not be actively announced on\nmailing lists or newsgroups. Users concerned about this problem are\nencouraged to check the above URL for any updates. \n\nRevision History\n================\n\n+---------------------------------------+\n| Revision | | Initial |\n| 1.0 | 2008-June-10 | public |\n| | | release |\n+---------------------------------------+\n\nCisco Security Procedures\n=========================\n\nComplete information on reporting security vulnerabilities in Cisco\nproducts, obtaining assistance with security incidents, and\nregistering to receive security information from Cisco, is available\non Cisco\u0027s worldwide website at\nhttp://www.cisco.com/en/US/products/products_security_vulnerability_policy.html. \nThis includes instructions for press inquiries regarding Cisco\nsecurity notices. All Cisco security advisories are available at\nhttp://www.cisco.com/go/psirt. \n\n- ---------------------------------------------------------------------\n\nUpdated: Jun 10, 2008 Document ID: 107408\n\n- ---------------------------------------------------------------------\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (Darwin)\n\niD8DBQFITruJ86n/Gc8U/uARAiuNAJwIq42/p8CUh7Dc88nAn9a1pfhhqgCfWXjv\n8bYhCD0EKNQ28koObq4S+vQ=\n=zOBL\n-----END PGP SIGNATURE-----\n. \n\nThe authentication code reads the length to be checked from sender input,\nthis allows the sender to supply single byte HMAC code and have a 1 in 256\nchance of matching the correct HMAC and authenticating, as only the first\nbyte will be checked. The sender would need to know a valid username. \n\nCurrently Net-SNMP and UCD-SNMP are known to be vulnerable, other SNMP\nimplementations may also be affected. The eCos project includes code derived\nfrom UCD-SNMP and is therefore also affected. \n\nAffected version:\n\nNet-SNMP \u003c= 5.4.1, \u003c= 5.3.2, \u003c= 5.2.4\nUCD-SNMP, all versions\neCos, all versions\n\nFixed version:\n\nNet-SNMP \u003e= 5.4.1.1, \u003e= 5.3.2.1, \u003e= 5.2.4.1\nUCD-SNMP, N/A\neCos, N/A\n\nCredit: this issue was reported by CERT/CC, it is tracked as VU#878044. \n\nCVE: CVE-2008-0960\n\nTimeline:\n2008-06-05: CERT/CC reports VU#878044 to oCERT requesting joint coordination\n2008-06-05: contacted affected vendors\n2008-06-06: added eCos to affected packages\n2008-06-09: patched net-snmp packages released\n2008-06-09: advisory release\n\nReferences:\nhttp://sourceforge.net/forum/forum.php?forum_id=833770\nhttp://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380\nhttp://www.kb.cert.org/vuls/id/878044\n\nLinks:\nhttp://www.net-snmp.org\nhttp://www.ece.ucdavis.edu/ucd-snmp\nhttp://ecos.sourceware.org\n\nPermalink:\nhttp://www.ocert.org/advisories/ocert-2008-006.html\n\n-- \nAndrea Barisani | Founder \u0026 Project Coordinator\n oCERT | Open Source Computer Emergency Response Team\n\n\u003clcars@ocert.org\u003e http://www.ocert.org\n 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E\n \"Pluralitas non est ponenda sine necessitate\"\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200808-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Net-SNMP: Multiple vulnerabilities\n Date: August 06, 2008\n Bugs: #222265, #225105\n ID: 200808-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Net-SNMP allow for authentication bypass in\nsnmpd and execution of arbitrary code in Perl applications using\nNet-SMNP. \n\nBackground\n==========\n\nNet-SNMP is a collection of tools for generating and retrieving SNMP\ndata. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-analyzer/net-snmp \u003c 5.4.1.1 \u003e= 5.4.1.1\n\nDescription\n===========\n\nWes Hardaker reported that the SNMPv3 HMAC verification relies on the\nclient to specify the HMAC length (CVE-2008-0960). John Kortink\nreported a buffer overflow in the Perl bindings of Net-SNMP when\nprocessing the OCTETSTRING in an attribute value pair (AVP) received by\nan SNMP agent (CVE-2008-2292). \n\nImpact\n======\n\nAn attacker could send SNMPv3 packets to an instance of snmpd providing\na valid user name and an HMAC length value of 1, and easily conduct\nbrute-force attacks to bypass SNMP authentication. An attacker could\nfurther entice a user to connect to a malicious SNMP agent with an SNMP\nclient using the Perl bindings, possibly resulting in the execution of\narbitrary code. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Net-SNMP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-analyzer/net-snmp-5.4.1.1\"\n\nReferences\n==========\n\n [ 1 ] CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n [ 2 ] CVE-2008-2292\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200808-02.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2008 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n \nCVE-2008-4309\n\n It was reported that an integer overflow in the\n netsnmp_create_subtree_cache function in agent/snmp_agent.c allows \n remote attackers to cause a denial of service attack via a crafted \n SNMP GETBULK request. \n\nFor the stable distribution (etch), these problems has been fixed in\nversion 5.2.3-7etch4. \n \nFor the testing distribution (lenny) and unstable distribution (sid)\nthese problems have been fixed in version 5.4.1~dfsg-11. \n\nWe recommend that you upgrade your net-snmp package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz\n Size/MD5 checksum: 94030 2ccd6191c3212980956c30de392825ec\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc\n Size/MD5 checksum: 1046 8018cc23033178515298d5583a74f9ff\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz\n Size/MD5 checksum: 4006389 ba4bc583413f90618228d0f196da8181\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb\n Size/MD5 checksum: 1214368 d579d8f28f3d704b6c09b2b480425086\n http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb\n Size/MD5 checksum: 855594 b5ccd827adbcefcca3557fa9ae28cc08\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 2169470 265835564ef2b0e2e86a08000461c53b\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 944098 5b903886ee4740842715797e3231602c\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 1901802 5486eb1f2a5b076e5342b1dd9cbb12e2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 933202 e3210ba1641079e0c3aaf4a50e89aedd\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 835584 b14db8c5e5b5e2d34799952975f903fb\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 932008 fc79672bf64eaabd41ed1c2f4a42c7da\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 1890766 ae3832515a97a79b31e0e7f0316356ee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 835088 62867e9ba9dfca3c7e8ae575d5a478f5\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 918844 d2d1bc5f555bc9dba153e2a9a964ffbf\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 1557924 5c2a33a015dd44708a9cc7602ca2525c\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 909974 4c1cef835efc0b7ff3fea54a618eabee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 835284 3ac835d926481c9e0f589b578455ddee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 928252 b98e98b58c61be02e477185293427d5c\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 1778292 b903adf3d1fa6e7a26f7cafb7bffdd6b\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 1344158 78b6cf6b2974983e8e3670468da73cd1\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 835940 9eeaf116e386dd7733ab2106c662dfa9\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 1809132 78bb5f1c12b004d32fa265e6bd99ffa1\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 1926116 71c7f3095ffe1bb22e84ade21f32b3a4\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 935434 85deac8531b02a0fdf3c9baa21d8e4bd\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 935640 958cb158264f75772864cd5d5c0bf251\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 1423294 f05c7491a8100684c5085588738f05b5\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 833970 cb705c9fe9418cc9348ac935ea7b0ba2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 920070 3df41a0c99c41d1bccf6801011cf8ed5\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 925914 159b4244ef701edbe0fb8c9685b5b477\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 1838900 3b7ac7b8fe0da1a3909ee56aba46d464\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 2205680 6868a56b1db04627e6921bf7237939a2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 970440 783f0cccabfbcc63590730b3803d164d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 2281114 fd04b505755a3aed0fe4c9baaac84500\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 842690 9f9ca89c3d3ba7c46481e9cd39c242a6\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 962854 c8a32f808d719357a5b6350e2b60794e\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 895414 5dd919d188291cb3727d39b5e06c9e26\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 927342 28c245db4d8ea82ba4075b27d674d72a\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 833182 0e0b21e13d77de82bed7a38d30f65e4b\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 1769524 24bdc73a3d20c4046c7741957442c713\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 1717562 977ae5c34a127d32d8f2bf222de9a431\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 1755032 cab5c112911465a9ce23a0d2ea44ded9\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 926616 2bf14a3fe74d9f2a523aacc8b04f5282\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 895194 b7c9ed37bf83ad92371f5472ac5d917b\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 833098 08b63ba6c3becf25ba2f941a532a7b71\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 1720642 1ff7568eb478edee923edb76cf42e9ac\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 941434 bbac9384bd7f88339e2b86fa665208c1\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 835212 4790d79f8de7f1bee7aabf0473f25268\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 1657890 b91fcf52e80c7196cea0c13df9ac79ef\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 1803262 4d298c9509941390c7b2eb68320ad211\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 928170 b17966a6a61313344ac827b58f32eeef\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 1409718 2a128cbdce2522ef49604255cff41af2\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 931452 d3bb7c3a849cd2b35fa6e4acb19c318d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 1834914 67e5b946df18b06b41b3e108d5ddc4e3\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 836102 7a4b85e8ea0e50d7213997b5f7d6309f\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 903864 3f80e78e4e2672aacf3da0690ff24b79\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 925336 5824ea607689f3f1bd62a9e6e28f95ae\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 1548630 1378d1cf730d3026bc1f01a4ab2ccedb\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 918592 28a086f6aa2ee8d510b38c1a177843fc\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 834186 068cbf2b4774ecf9504b820db26e6f1d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 1782014 d39fae5fe0d1397a2a1bd7397d6e850a\n\n\n These files will probably be moved into the stable distribution on\n its next update. Summary\n\n Updated ESX packages for OpenSSL, net-snmp, perl. \n\n2. Relevant releases\n \n ESX 3.0.2\n ESX 3.0.1\n\n Extended Support (Security and Bug fixes) for ESX 3.0.1 has ended on\n 2008-07-31. Users should plan to upgrade to at least 3.0.2 update 1\n and preferably the newest release available. \n\n3. Problem Description\n\n I Security Issues\n\n a. OpenSSL Binaries Updated\n\n This fix updates the third party OpenSSL library. \n \n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows affected, patch pending\n\n hosted * any any for patch info see VMSA-2008-0005\n \n ESXi 3.5 ESXi affected, patch pending\n\n ESX 3.5 ESX for patch info see VMSA-2008-0001\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX affected, patch pending\n ESX 3.0.1 ESX affected, patch pending\n ESX 2.5.5 ESX for patch info see VMSA-2008-0001\n ESX 2.5.4 ESX for patch info see VMSA-2008-0001\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n \n II Service Console rpm updates\n\n a. net-snmp Security update\n \n This fix upgrades the service console rpm for net-snmp to version\n net-snmp-5.0.9-2.30E.24. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not applicable\n\n hosted * any any not applicable\n \n ESXi 3.5 ESXi not applicable\n\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX affected, patch pending\n ESX 3.0.1 ESX affected, patch pending\n ESX 2.5.5 ESX not affected\n ESX 2.5.4 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n\n b. perl Security update\n \n This fix upgrades the service console rpm for perl to version\n perl-5.8.0-98.EL3. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not applicable\n\n hosted * any any not applicable\n \n ESXi 3.5 ESXi not applicable\n\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX affected, patch pending\n ESX 3.0.1 ESX affected, patch pending\n ESX 2.5.5 ESX not affected\n ESX 2.5.4 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion\n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n ESX\n ---\n ESX 3.0.3 build 104629\n ESX Server 3.0.3 CD image\n md5sum: c2cda9242c6981c7eba1004e8fc5626d\n Upgrade package from ESX Server 2.x to ESX Server 3.0.3\n md5sum: 0ad8fa4707915139d8b2343afebeb92b\n Upgrade package from earlier releases of ESX Server 3 to ESX Server\n3.0.3\n md5sum: ff7f3dc12d34b474b231212bdf314113\n release notes:\n http://www.vmware.com/support/vi3/doc/releasenotes_esx303.html\n \n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2008-08-12 VMSA-2008-0013 \nInitial release following release of ESX 3.0.3. \n\n- ------------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2008 VMware Inc. All rights reserved. An attacker\n could exploit this flaw to spoof an authenticated SNMPv3 packet\n (CVE-2008-0960). \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 8db66ef5a5468d3fd72a47855230a28e 2007.1/i586/libnet-snmp10-5.3.1-3.2mdv2007.1.i586.rpm\n c951b17138ef11828b2ccf031d4cddaf 2007.1/i586/libnet-snmp10-devel-5.3.1-3.2mdv2007.1.i586.rpm\n 536a87919f32fac81964d0a907bf08fe 2007.1/i586/libnet-snmp10-static-devel-5.3.1-3.2mdv2007.1.i586.rpm\n 39e33947c21666dac5dbe5cfe103b26d 2007.1/i586/net-snmp-5.3.1-3.2mdv2007.1.i586.rpm\n 1eed5ebaff8f6f83befbf8d831900073 2007.1/i586/net-snmp-mibs-5.3.1-3.2mdv2007.1.i586.rpm\n 874db03c69584025e4d91049072d3c4e 2007.1/i586/net-snmp-trapd-5.3.1-3.2mdv2007.1.i586.rpm\n 11af93c879d8cd9353b7cb1826900222 2007.1/i586/net-snmp-utils-5.3.1-3.2mdv2007.1.i586.rpm\n 2c9e819eeb5fd472f6a0fe338d86182b 2007.1/i586/perl-NetSNMP-5.3.1-3.2mdv2007.1.i586.rpm \n 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n aa27de502ce22110fd745c0b847b79d9 2007.1/x86_64/lib64net-snmp10-5.3.1-3.2mdv2007.1.x86_64.rpm\n 1843dd154c443cca9ae977e502221d6d 2007.1/x86_64/lib64net-snmp10-devel-5.3.1-3.2mdv2007.1.x86_64.rpm\n 838bd7820d446bd947bc46e090b38066 2007.1/x86_64/lib64net-snmp10-static-devel-5.3.1-3.2mdv2007.1.x86_64.rpm\n e659d3df04816330c7bf45008f66bc27 2007.1/x86_64/net-snmp-5.3.1-3.2mdv2007.1.x86_64.rpm\n 756d5606a1039d20a7512b0a109d53bb 2007.1/x86_64/net-snmp-mibs-5.3.1-3.2mdv2007.1.x86_64.rpm\n 8ad36943e07362865f3a48c99914e48c 2007.1/x86_64/net-snmp-trapd-5.3.1-3.2mdv2007.1.x86_64.rpm\n 483140c06017507127d12357c3ed2b41 2007.1/x86_64/net-snmp-utils-5.3.1-3.2mdv2007.1.x86_64.rpm\n e2bb901815ffa1ca5b0a16bc1363f84f 2007.1/x86_64/perl-NetSNMP-5.3.1-3.2mdv2007.1.x86_64.rpm \n 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 8de3c4975620db2b2c2697d6f9deb79b 2008.0/i586/libnet-snmp15-5.4.1-1.1mdv2008.0.i586.rpm\n b1991c58d996f4be200fe141e28c5f7d 2008.0/i586/libnet-snmp-devel-5.4.1-1.1mdv2008.0.i586.rpm\n 03c54182cc7f97633f29ff0251a8c898 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.1mdv2008.0.i586.rpm\n 1f792de19b7b38b56d68242958d5d800 2008.0/i586/net-snmp-5.4.1-1.1mdv2008.0.i586.rpm\n e3362a641e232a6ecf0b8230f0e49ec8 2008.0/i586/net-snmp-mibs-5.4.1-1.1mdv2008.0.i586.rpm\n bc6d8c10135ea64a4d512d80d04b1b39 2008.0/i586/net-snmp-trapd-5.4.1-1.1mdv2008.0.i586.rpm\n 8e7f28ee85fb48129eea57d11d391c8b 2008.0/i586/net-snmp-utils-5.4.1-1.1mdv2008.0.i586.rpm\n beab129e378f61a6bf62d366a4d90639 2008.0/i586/perl-NetSNMP-5.4.1-1.1mdv2008.0.i586.rpm \n 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 82b570c9cb7e0662df4d7da730c131db 2008.0/x86_64/lib64net-snmp15-5.4.1-1.1mdv2008.0.x86_64.rpm\n 20b8a6e3fc8dd82fe5ecfdb337553938 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.1mdv2008.0.x86_64.rpm\n 555688caa0eee850b3a5f835a5778849 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.1mdv2008.0.x86_64.rpm\n 60d65f80aec29dcb6d4ceb4bb117a9bc 2008.0/x86_64/net-snmp-5.4.1-1.1mdv2008.0.x86_64.rpm\n 685c9dd25b585afc128de1b3c092e5d5 2008.0/x86_64/net-snmp-mibs-5.4.1-1.1mdv2008.0.x86_64.rpm\n 7bff860904572c092f737ac17940d5b2 2008.0/x86_64/net-snmp-trapd-5.4.1-1.1mdv2008.0.x86_64.rpm\n e434686bddfb04f2a8bd01346517ecb4 2008.0/x86_64/net-snmp-utils-5.4.1-1.1mdv2008.0.x86_64.rpm\n 4fab6e498e1f05809db500ce895aad66 2008.0/x86_64/perl-NetSNMP-5.4.1-1.1mdv2008.0.x86_64.rpm \n 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.1:\n 4bafceae1a29f6557b5aa884eca24ba0 2008.1/i586/libnet-snmp15-5.4.1-5.1mdv2008.1.i586.rpm\n 1eedbae5df7e503de1cba736129beaa1 2008.1/i586/libnet-snmp-devel-5.4.1-5.1mdv2008.1.i586.rpm\n 615a88847cbf1ce6eaf0029037a14b1b 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.1mdv2008.1.i586.rpm\n 7323cb7d35eb67664d40ad73b413679d 2008.1/i586/net-snmp-5.4.1-5.1mdv2008.1.i586.rpm\n d43ed96a806639a94af2a137c75e276e 2008.1/i586/net-snmp-mibs-5.4.1-5.1mdv2008.1.i586.rpm\n 7394b1361b43056b5eb99827771358cf 2008.1/i586/net-snmp-tkmib-5.4.1-5.1mdv2008.1.i586.rpm\n 8d6fd9308c2edbe8c020d2c33b3a841d 2008.1/i586/net-snmp-trapd-5.4.1-5.1mdv2008.1.i586.rpm\n dc58047a02e1a222af20aa794ea8f447 2008.1/i586/net-snmp-utils-5.4.1-5.1mdv2008.1.i586.rpm\n 2ad9888cd61fc4952c1cee0c48f714b5 2008.1/i586/perl-NetSNMP-5.4.1-5.1mdv2008.1.i586.rpm \n 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n 618c241e0ecb57685646264c9bb083b4 2008.1/x86_64/lib64net-snmp15-5.4.1-5.1mdv2008.1.x86_64.rpm\n bb0ebf49ee7cca29965aeb398f4725f6 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.1mdv2008.1.x86_64.rpm\n b4f29f00773291f6cc00784ed7cde470 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.1mdv2008.1.x86_64.rpm\n 3039811b6682dc4009b32ff48a99eb2b 2008.1/x86_64/net-snmp-5.4.1-5.1mdv2008.1.x86_64.rpm\n fab09178635501eb5d6a82eb7bd532a3 2008.1/x86_64/net-snmp-mibs-5.4.1-5.1mdv2008.1.x86_64.rpm\n da29d4c7edaa15d95f8bee98dbfab025 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.1mdv2008.1.x86_64.rpm\n d9aad834d82d310c64f6f21e17a55920 2008.1/x86_64/net-snmp-trapd-5.4.1-5.1mdv2008.1.x86_64.rpm\n 7a7c871bd87dc91c16b046ac115cda70 2008.1/x86_64/net-snmp-utils-5.4.1-5.1mdv2008.1.x86_64.rpm\n d102ea2af0fcaaebd98defda72bcfc91 2008.1/x86_64/perl-NetSNMP-5.4.1-5.1mdv2008.1.x86_64.rpm \n 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm\n\n Corporate 3.0:\n 335af3930865c8eb44ef436cad5fb373 corporate/3.0/i586/libnet-snmp5-5.1-7.4.C30mdk.i586.rpm\n b8e1d307ee6fa3905d292077fc063318 corporate/3.0/i586/libnet-snmp5-devel-5.1-7.4.C30mdk.i586.rpm\n a668cc4de411865567d1a93f34cee1e3 corporate/3.0/i586/libnet-snmp5-static-devel-5.1-7.4.C30mdk.i586.rpm\n d8c0d342b03e5719443d2de06c631bd5 corporate/3.0/i586/libsnmp0-4.2.3-8.2.C30mdk.i586.rpm\n 6bbe3bb2502ce3c974f7b5737331bb4d corporate/3.0/i586/libsnmp0-devel-4.2.3-8.2.C30mdk.i586.rpm\n daca10f2e578f75c1e7415d78ed30265 corporate/3.0/i586/net-snmp-5.1-7.4.C30mdk.i586.rpm\n 1630ebd75201e1bc3956b12a26282f92 corporate/3.0/i586/net-snmp-mibs-5.1-7.4.C30mdk.i586.rpm\n 5a4f483c877a6278088a265cb3273d61 corporate/3.0/i586/net-snmp-trapd-5.1-7.4.C30mdk.i586.rpm\n 316d866de7fa7cd984d58f5cb742f5e3 corporate/3.0/i586/net-snmp-utils-5.1-7.4.C30mdk.i586.rpm\n e3d4197517565f12e2c3a8fd1cc5d2e7 corporate/3.0/i586/ucd-snmp-4.2.3-8.2.C30mdk.i586.rpm\n 17e8d856fd1dac18552818a842105c88 corporate/3.0/i586/ucd-snmp-utils-4.2.3-8.2.C30mdk.i586.rpm \n ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm\n 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n b31f277942fca76d953007c94a60cae2 corporate/3.0/x86_64/lib64net-snmp5-5.1-7.4.C30mdk.x86_64.rpm\n e4a3fba10ccdd805dc8783ae68c99a42 corporate/3.0/x86_64/lib64net-snmp5-devel-5.1-7.4.C30mdk.x86_64.rpm\n 530a94cc87af0e4d6e9f3815473c0dd4 corporate/3.0/x86_64/lib64net-snmp5-static-devel-5.1-7.4.C30mdk.x86_64.rpm\n f246ca421b5d16c599d53f70e4b97660 corporate/3.0/x86_64/lib64snmp0-4.2.3-8.2.C30mdk.x86_64.rpm\n b943e07726a2fecb016ef4ba626906d8 corporate/3.0/x86_64/lib64snmp0-devel-4.2.3-8.2.C30mdk.x86_64.rpm\n 22822876f72e35cf6d1ed027df93e74a corporate/3.0/x86_64/net-snmp-5.1-7.4.C30mdk.x86_64.rpm\n e7e51782b9bbd1e1bdf93c17fb953280 corporate/3.0/x86_64/net-snmp-mibs-5.1-7.4.C30mdk.x86_64.rpm\n e67a9105f9492c020693d48ce55652ea corporate/3.0/x86_64/net-snmp-trapd-5.1-7.4.C30mdk.x86_64.rpm\n 171a17e507b2dfdb9c70c0089e582221 corporate/3.0/x86_64/net-snmp-utils-5.1-7.4.C30mdk.x86_64.rpm\n 96886146d21175b076e92d59e96f5016 corporate/3.0/x86_64/ucd-snmp-4.2.3-8.2.C30mdk.x86_64.rpm\n 1b6ee4c253f15be516a1928a4f791f15 corporate/3.0/x86_64/ucd-snmp-utils-4.2.3-8.2.C30mdk.x86_64.rpm \n ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm\n 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm\n\n Corporate 4.0:\n 6cbe9d76db3b05c2435bcbc5cf16c898 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 586a55cfde45020d5ea0ebf5f2d6c840 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm\n d992d8300cf0639942a179349d592e15 corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 03a49b848c376b705dcfcef0ec817daf corporate/4.0/i586/net-snmp-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 22b9d01b3b7a8a34ed3e1a5a435286a8 corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.i586.rpm\n dccc01a94c1f29eac2875e6a935bf589 corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 77f93230f96abce039b52ca5612eaa36 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 8a7209b70979c9d73035ff40cbd8dbb4 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.i586.rpm \n ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n f94c7e967973ba8aa12b5605251d6e78 corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n f332985986eff2d6c8a75b5c263dedb1 corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 82fc454916e75866370ee738292021c8 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n ff0adeb23df57eb34869c7100df159da corporate/4.0/x86_64/net-snmp-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 72f2dc9cb1695999660a9ff9c97e4c47 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 0f244551c87e051a8274e5050cf0bc2a corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 7c4e7fb304c77c6551a50495d338e84e corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 68d81ca4c173710ef43b36092df2a6ee corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.x86_64.rpm \n ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm\n\n Multi Network Firewall 2.0:\n f98286a301d580fe306917cf0169ef88 mnf/2.0/i586/libnet-snmp5-5.1-7.4.M20mdk.i586.rpm \n 3ba27516773b1dd933828207cecc7754 mnf/2.0/SRPMS/net-snmp-5.1-7.4.M20mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFIW/O7mqjQ0CJFipgRAlNDAJwKuG+ljPAS2MDqj4QOlf+2PtWFUQCeIlun\nKcp+qeLAEA/HEE8HXT88NkY=\n=D9Hu\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-0960"
},
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "PACKETSTORM",
"id": "67160"
},
{
"db": "PACKETSTORM",
"id": "67140"
},
{
"db": "PACKETSTORM",
"id": "68866"
},
{
"db": "PACKETSTORM",
"id": "71748"
},
{
"db": "PACKETSTORM",
"id": "69029"
},
{
"db": "PACKETSTORM",
"id": "67532"
}
],
"trust": 3.33
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-31085",
"trust": 0.1,
"type": "unknown"
},
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=5790",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#878044",
"trust": 3.8
},
{
"db": "NVD",
"id": "CVE-2008-0960",
"trust": 3.5
},
{
"db": "OCERT",
"id": "OCERT-2008-006",
"trust": 3.0
},
{
"db": "BID",
"id": "29623",
"trust": 2.9
},
{
"db": "SECUNIA",
"id": "30574",
"trust": 2.8
},
{
"db": "USCERT",
"id": "TA08-162A",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "30665",
"trust": 2.0
},
{
"db": "VUPEN",
"id": "ADV-2008-2971",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1788",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1787",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1836",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1800",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2009-1612",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1797",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1801",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-1981",
"trust": 1.8
},
{
"db": "VUPEN",
"id": "ADV-2008-2361",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "5790",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "32664",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "35463",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "33003",
"trust": 1.8
},
{
"db": "SREASON",
"id": "3933",
"trust": 1.8
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2008/06/09/1",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1020218",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "30802",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30626",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "31334",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30612",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30615",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "31568",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "31351",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30648",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "31467",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30647",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30596",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431",
"trust": 0.8
},
{
"db": "BUGTRAQ",
"id": "20081031 VMSA-2008-0017 UPDATED ESX PACKAGES FOR LIBXML2, UCD-SNMP, LIBTIFF",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20080609 [OCERT-2008-006] MULTIPLE SNMP IMPLEMENTATIONS HMAC AUTHENTICATION SPOOFING",
"trust": 0.6
},
{
"db": "REDHAT",
"id": "RHSA-2008:0529",
"trust": 0.6
},
{
"db": "MANDRIVA",
"id": "MDVSA-2008:118",
"trust": 0.6
},
{
"db": "MILW0RM",
"id": "5790",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2008-5218",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2008-5215",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2008-5224",
"trust": 0.6
},
{
"db": "SUNALERT",
"id": "238865",
"trust": 0.6
},
{
"db": "MLIST",
"id": "[OSS-SECURITY] 20080609 [OCERT-2008-006] MULTIPLE SNMP IMPLEMENTATIONS HMAC AUTHENTICATION SPOOFING",
"trust": 0.6
},
{
"db": "CERT/CC",
"id": "TA08-162A",
"trust": 0.6
},
{
"db": "UBUNTU",
"id": "USN-685-1",
"trust": 0.6
},
{
"db": "DEBIAN",
"id": "DSA-1663",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20080610 SNMP VERSION 3 AUTHENTICATION VULNERABILITIES",
"trust": 0.6
},
{
"db": "GENTOO",
"id": "GLSA-200808-02",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "67160",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "67532",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68866",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "67140",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "71748",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "68741",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "67231",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "72606",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-31085",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2008-0960",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "69029",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "PACKETSTORM",
"id": "67160"
},
{
"db": "PACKETSTORM",
"id": "67140"
},
{
"db": "PACKETSTORM",
"id": "68866"
},
{
"db": "PACKETSTORM",
"id": "71748"
},
{
"db": "PACKETSTORM",
"id": "69029"
},
{
"db": "PACKETSTORM",
"id": "67532"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"id": "VAR-200806-0575",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-31085"
}
],
"trust": 0.61355825
},
"last_update_date": "2025-12-22T20:51:55.070000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Security Update 2008-004",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT2163"
},
{
"title": "net-snmp-5.3.1-19.1.1AXS3",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=146"
},
{
"title": "cisco-sa-20080610-snmpv3",
"trust": 0.8,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"title": "1291",
"trust": 0.8,
"url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=1291"
},
{
"title": "1328",
"trust": 0.8,
"url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=1328"
},
{
"title": "NV08-007",
"trust": 0.8,
"url": "http://www.nec.co.jp/security-info/secinfo/nv08-007.html"
},
{
"title": "Fixes VU#878044 and CVE-2008-0960",
"trust": 0.8,
"url": "https://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"title": "RHSA-2008:0528",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"title": "RHSA-2008:0529",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2008-0529.html"
},
{
"title": "Net-SNMP SNMPv3 USM \u8a8d\u8a3c\u51e6\u7406\u306e\u8106\u5f31\u6027",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2008/06111446.php"
},
{
"title": "238865",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1"
},
{
"title": "snmp_12",
"trust": 0.8,
"url": "http://fenics.fujitsu.com/products/support/2008/snmp_12.html"
},
{
"title": "SNMPv3\u306b\u95a2\u3059\u308b\u8a8d\u8a3c\u56de\u907f\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://www.allied-telesis.co.jp/support/list/faq/vuls/20080924.html"
},
{
"title": "AX-VU2008-02",
"trust": 0.8,
"url": "http://www.alaxala.com/jp/support/security/20080630.html"
},
{
"title": "RHSA-2008:0528",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0528J.html"
},
{
"title": "RHSA-2008:0529",
"trust": 0.8,
"url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0529J.html"
},
{
"title": "YSAR-15-0002: Vnet/IP\u7528\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u30a4\u30c3\u30c1\u306bSNMPv3\u8a8d\u8a3c\u8fc2\u56de\u306e\u8106\u5f31\u6027",
"trust": 0.8,
"url": "http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm"
},
{
"title": "SNMPv3",
"trust": 0.8,
"url": "http://www.hitachi.co.jp/Prod/comp/network/notice/SNMPv3.html"
},
{
"title": "TA08-162A",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-162a.html"
},
{
"title": "Debian CVElist Bug Report Logs: net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a8541a6f686f7cf0c507fc152f31fed3"
},
{
"title": "Cisco: SNMP Version 3 Authentication Vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20080610-snmpv3"
},
{
"title": "Ubuntu Security Notice: net-snmp vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-685-1"
},
{
"title": "Debian Security Advisories: DSA-1663-1 net-snmp -- several vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=61d231c8116737565b9155223d52d04c"
},
{
"title": "VMware Security Advisories: Updated ESX packages for libxml2, ucd-snmp, libtiff",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=4b3f89e87c3a2b8f6ca491f31d73afa9"
},
{
"title": "VMware Security Advisories: Updated ESX packages for OpenSSL, net-snmp, perl",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=66428db28c8b0a38eb32535e5949367a"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"trust": 3.0,
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"trust": 2.7,
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"trust": 2.6,
"url": "http://www.securityfocus.com/bid/29623"
},
{
"trust": 2.6,
"url": "http://www.us-cert.gov/cas/techalerts/ta08-162a.html"
},
{
"trust": 2.2,
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"trust": 2.1,
"url": "http://support.apple.com/kb/ht2163"
},
{
"trust": 2.1,
"url": "http://support.avaya.com/elmodocs2/security/asa-2008-282.htm"
},
{
"trust": 2.1,
"url": "http://www.kb.cert.org/vuls/id/mimg-7ets5z"
},
{
"trust": 2.1,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"trust": 1.9,
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"trust": 1.8,
"url": "http://www.kb.cert.org/vuls/id/ctar-7fbs8q"
},
{
"trust": 1.8,
"url": "http://www.kb.cert.org/vuls/id/mimg-7ets87"
},
{
"trust": 1.8,
"url": "http://www.vmware.com/security/advisories/vmsa-2008-0013.html"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"trust": 1.8,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00363.html"
},
{
"trust": 1.8,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00459.html"
},
{
"trust": 1.8,
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00380.html"
},
{
"trust": 1.8,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:118"
},
{
"trust": 1.8,
"url": "http://www.vmware.com/security/advisories/vmsa-2008-0017.html"
},
{
"trust": 1.8,
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"trust": 1.8,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0529.html"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id?1020218"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/32664"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/33003"
},
{
"trust": 1.8,
"url": "http://secunia.com/advisories/35463"
},
{
"trust": 1.8,
"url": "http://securityreason.com/securityalert/3933"
},
{
"trust": 1.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"trust": 1.8,
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"trust": 1.8,
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"trust": 1.8,
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/30574/"
},
{
"trust": 1.5,
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"trust": 1.5,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0528.html"
},
{
"trust": 1.2,
"url": "http://lists.apple.com/archives/security-announce/2008//jun/msg00002.html"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"trust": 1.2,
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"trust": 1.2,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10820"
},
{
"trust": 1.2,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5785"
},
{
"trust": 1.2,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6414"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30574"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30596"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30612"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30615"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30626"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30647"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30648"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30665"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30802"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/31334"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/31351"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/31467"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/31568"
},
{
"trust": 1.2,
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"trust": 1.1,
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"trust": 1.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0960"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/30665/"
},
{
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1 "
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu878044/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta08-162a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta08-162a/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0960"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0960"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/497962/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/493218/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.milw0rm.com/exploits/5790"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2971"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/2361"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1981/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1836/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1801/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1800/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1797/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1788/references"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2008/1787/references"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2292"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a00809adfc8.html"
},
{
"trust": 0.3,
"url": "http://www.net-snmp.org/"
},
{
"trust": 0.3,
"url": "http://www.ingate.com/relnote.php?ver=471"
},
{
"trust": 0.3,
"url": "/archive/1/493218"
},
{
"trust": 0.3,
"url": "/archive/1/493238"
},
{
"trust": 0.3,
"url": "/archive/1/493304"
},
{
"trust": 0.3,
"url": "/archive/1/495389"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/elmodocs2/security/asa-2008-252.htm"
},
{
"trust": 0.3,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026id=766427"
},
{
"trust": 0.3,
"url": "http://support.nortel.com/go/main.jsp?cscat=bltndetail\u0026documentoid=905600\u0026poid="
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2008-0529.html"
},
{
"trust": 0.3,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1"
},
{
"trust": 0.3,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2292"
},
{
"trust": 0.1,
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026amp;aid=1989089\u0026amp;group_id=12694\u0026amp;atid=456380"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=127730470825399\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/287.html"
},
{
"trust": 0.1,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485945"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20080610-snmpv3"
},
{
"trust": 0.1,
"url": "https://www.exploit-db.com/exploits/5790/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/685-1/"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/prod_warranties_item09186a008088e31f.html"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml#fortify"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/prod/collateral/iosswrel/ps6537/ps6586/ps6642/prod_white_paper0900aecd804fa16a.html"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/docs/ios/12_3t/12_3t4/feature/guide/gtrtlimt.html"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html"
},
{
"trust": 0.1,
"url": "https://supportportal.ironport.com/irppcnctr/srvcd?u=http://secure-support.soma.ironport.com/announcement\u0026sid=900016"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/707/cisco-amb-20080610-snmpv3.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/tech/tk648/tk361/technologies_white_paper09186a00801a1a55.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/go/psirt."
},
{
"trust": 0.1,
"url": "http://www.cisco.com/en/us/tech/tk648/tk361/technologies_white_paper09186a00801afc76.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/warp/public/687/directory/dirtac.shtml"
},
{
"trust": 0.1,
"url": "http://www.cisco.com/public/sw-center/sw-usingswc.shtml."
},
{
"trust": 0.1,
"url": "http://intellishield.cisco.com/security/alertmanager/cvss"
},
{
"trust": 0.1,
"url": "http://ecos.sourceware.org"
},
{
"trust": 0.1,
"url": "http://www.ece.ucdavis.edu/ucd-snmp"
},
{
"trust": 0.1,
"url": "http://www.net-snmp.org"
},
{
"trust": 0.1,
"url": "http://www.ocert.org"
},
{
"trust": 0.1,
"url": "http://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4309"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://packages.debian.org/\u003cpkg\u003e"
},
{
"trust": 0.1,
"url": "http://security.debian.org/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/vi3/doc/releasenotes_esx303.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5135"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/security"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1927"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1927"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/security_response.html"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1055"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5135"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3108"
},
{
"trust": 0.1,
"url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-3108"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos_vi.html"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos.html"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/advisories"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "PACKETSTORM",
"id": "67160"
},
{
"db": "PACKETSTORM",
"id": "67140"
},
{
"db": "PACKETSTORM",
"id": "68866"
},
{
"db": "PACKETSTORM",
"id": "71748"
},
{
"db": "PACKETSTORM",
"id": "69029"
},
{
"db": "PACKETSTORM",
"id": "67532"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#878044"
},
{
"db": "VULHUB",
"id": "VHN-31085"
},
{
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"db": "BID",
"id": "29623"
},
{
"db": "PACKETSTORM",
"id": "67160"
},
{
"db": "PACKETSTORM",
"id": "67140"
},
{
"db": "PACKETSTORM",
"id": "68866"
},
{
"db": "PACKETSTORM",
"id": "71748"
},
{
"db": "PACKETSTORM",
"id": "69029"
},
{
"db": "PACKETSTORM",
"id": "67532"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-06-10T00:00:00",
"db": "CERT/CC",
"id": "VU#878044"
},
{
"date": "2008-06-10T00:00:00",
"db": "VULHUB",
"id": "VHN-31085"
},
{
"date": "2008-06-10T00:00:00",
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"date": "2008-06-10T00:00:00",
"db": "BID",
"id": "29623"
},
{
"date": "2008-06-11T00:59:03",
"db": "PACKETSTORM",
"id": "67160"
},
{
"date": "2008-06-11T00:30:32",
"db": "PACKETSTORM",
"id": "67140"
},
{
"date": "2008-08-06T21:36:36",
"db": "PACKETSTORM",
"id": "68866"
},
{
"date": "2008-11-09T21:15:50",
"db": "PACKETSTORM",
"id": "71748"
},
{
"date": "2008-08-13T04:58:12",
"db": "PACKETSTORM",
"id": "69029"
},
{
"date": "2008-06-21T01:10:58",
"db": "PACKETSTORM",
"id": "67532"
},
{
"date": "2008-06-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"date": "2008-07-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"date": "2008-06-10T18:32:00",
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-07-16T00:00:00",
"db": "CERT/CC",
"id": "VU#878044"
},
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-31085"
},
{
"date": "2018-10-30T00:00:00",
"db": "VULMON",
"id": "CVE-2008-0960"
},
{
"date": "2015-04-13T22:21:00",
"db": "BID",
"id": "29623"
},
{
"date": "2011-07-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200806-140"
},
{
"date": "2016-11-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001431"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2008-0960"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "71748"
},
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
}
],
"trust": 0.7
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SNMPv3 improper HMAC validation allows authentication bypass",
"sources": [
{
"db": "CERT/CC",
"id": "VU#878044"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200806-140"
}
],
"trust": 0.6
}
}
FKIE_CVE-2008-0960
Vulnerability from fkie_nvd - Published: 2008-06-10 18:32 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| cret@cert.org | http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html | ||
| cret@cert.org | http://lists.ingate.com/pipermail/productinfo/2008/000021.html | ||
| cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html | ||
| cret@cert.org | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
| cret@cert.org | http://rhn.redhat.com/errata/RHSA-2008-0528.html | ||
| cret@cert.org | http://secunia.com/advisories/30574 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/30596 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/30612 | ||
| cret@cert.org | http://secunia.com/advisories/30615 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/30626 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/30647 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/30648 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/30665 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/30802 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/31334 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/31351 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/31467 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/31568 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/32664 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/33003 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/35463 | ||
| cret@cert.org | http://security.gentoo.org/glsa/glsa-200808-02.xml | ||
| cret@cert.org | http://securityreason.com/securityalert/3933 | ||
| cret@cert.org | http://sourceforge.net/forum/forum.php?forum_id=833770 | ||
| cret@cert.org | http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380 | ||
| cret@cert.org | http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1 | ||
| cret@cert.org | http://support.apple.com/kb/HT2163 | ||
| cret@cert.org | http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm | ||
| cret@cert.org | http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml | Vendor Advisory | |
| cret@cert.org | http://www.debian.org/security/2008/dsa-1663 | Patch | |
| cret@cert.org | http://www.kb.cert.org/vuls/id/878044 | US Government Resource | |
| cret@cert.org | http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q | US Government Resource | |
| cret@cert.org | http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z | US Government Resource | |
| cret@cert.org | http://www.kb.cert.org/vuls/id/MIMG-7ETS87 | US Government Resource | |
| cret@cert.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:118 | ||
| cret@cert.org | http://www.ocert.org/advisories/ocert-2008-006.html | ||
| cret@cert.org | http://www.openwall.com/lists/oss-security/2008/06/09/1 | ||
| cret@cert.org | http://www.redhat.com/support/errata/RHSA-2008-0529.html | ||
| cret@cert.org | http://www.securityfocus.com/archive/1/493218/100/0/threaded | ||
| cret@cert.org | http://www.securityfocus.com/archive/1/497962/100/0/threaded | ||
| cret@cert.org | http://www.securityfocus.com/bid/29623 | Exploit, Patch | |
| cret@cert.org | http://www.securitytracker.com/id?1020218 | ||
| cret@cert.org | http://www.ubuntu.com/usn/usn-685-1 | ||
| cret@cert.org | http://www.us-cert.gov/cas/techalerts/TA08-162A.html | US Government Resource | |
| cret@cert.org | http://www.vmware.com/security/advisories/VMSA-2008-0013.html | ||
| cret@cert.org | http://www.vmware.com/security/advisories/VMSA-2008-0017.html | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/1787/references | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/1788/references | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/1797/references | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/1800/references | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/1801/references | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/1836/references | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/1981/references | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/2361 | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2008/2971 | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2009/1612 | ||
| cret@cert.org | https://bugzilla.redhat.com/show_bug.cgi?id=447974 | ||
| cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820 | ||
| cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785 | ||
| cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414 | ||
| cret@cert.org | https://www.exploit-db.com/exploits/5790 | ||
| cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html | ||
| cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html | ||
| cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.ingate.com/pipermail/productinfo/2008/000021.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2008-0528.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30574 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30596 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30612 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30615 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30626 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30647 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30648 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30665 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30802 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31334 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31351 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31467 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31568 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32664 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33003 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35463 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200808-02.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3933 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/forum/forum.php?forum_id=833770 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT2163 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1663 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/878044 | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MIMG-7ETS87 | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:118 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ocert.org/advisories/ocert-2008-006.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/06/09/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0529.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493218/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/497962/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/29623 | Exploit, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020218 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-685-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-162A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0013.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0017.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1787/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1788/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1797/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1800/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1801/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1836/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1981/references | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2361 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2971 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1612 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=447974 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/5790 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html |
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | catos | 7.1.1 | |
| cisco | catos | 7.3.1 | |
| cisco | catos | 7.4.1 | |
| cisco | catos | 8.3 | |
| cisco | cisco_ios | 12.0 | |
| cisco | cisco_ios | 12.0 | |
| cisco | cisco_ios | 12.1 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.2 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.3 | |
| cisco | cisco_ios | 12.4 | |
| cisco | cisco_ios | 12.4 | |
| cisco | cisco_ios | 12.4 | |
| cisco | cisco_ios | 12.4 | |
| cisco | cisco_ios | 12.4 | |
| cisco | cisco_ios | 12.4 | |
| cisco | cisco_ios | 12.4 | |
| cisco | cisco_ios | 12.4 | |
| cisco | ios | 10.0 | |
| cisco | ios | 11.0 | |
| cisco | ios | 11.1 | |
| cisco | ios | 11.3 | |
| cisco | ios | 12.2 | |
| cisco | ios_xr | 2.0 | |
| cisco | ios_xr | 3.0 | |
| cisco | ios_xr | 3.2 | |
| cisco | ios_xr | 3.3 | |
| cisco | ios_xr | 3.4 | |
| cisco | ios_xr | 3.5 | |
| cisco | ios_xr | 3.6 | |
| cisco | ios_xr | 3.7 | |
| cisco | nx_os | 4.0 | |
| cisco | nx_os | 4.0.1 | |
| cisco | nx_os | 4.0.2 | |
| ecos_sourceware | ecos | 1.1 | |
| ecos_sourceware | ecos | 1.2.1 | |
| ecos_sourceware | ecos | 1.3.1 | |
| ecos_sourceware | ecos | 2.0 | |
| ecos_sourceware | ecos | 2.0 | |
| net-snmp | net_snmp | 5.0 | |
| net-snmp | net_snmp | 5.0.1 | |
| net-snmp | net_snmp | 5.0.2 | |
| net-snmp | net_snmp | 5.0.3 | |
| net-snmp | net_snmp | 5.0.4 | |
| net-snmp | net_snmp | 5.0.5 | |
| net-snmp | net_snmp | 5.0.6 | |
| net-snmp | net_snmp | 5.0.7 | |
| net-snmp | net_snmp | 5.0.8 | |
| net-snmp | net_snmp | 5.0.9 | |
| net-snmp | net_snmp | 5.1 | |
| net-snmp | net_snmp | 5.1.1 | |
| net-snmp | net_snmp | 5.1.2 | |
| net-snmp | net_snmp | 5.2 | |
| net-snmp | net_snmp | 5.3 | |
| net-snmp | net_snmp | 5.3.0.1 | |
| net-snmp | net_snmp | 5.4 | |
| sun | solaris | 10.0 | |
| sun | sunos | 5.10 | |
| cisco | ace_10_6504_bundle_with_4_gbps_throughput | * | |
| cisco | ace_10_6509_bundle_with_8_gbps_throughput | * | |
| cisco | ace_10_service_module | * | |
| cisco | ace_20_6504_bundle_with__4gbps_throughput | * | |
| cisco | ace_20_6509_bundle_with_8gbps_throughput | * | |
| cisco | ace_20_service_module | * | |
| cisco | ace_4710 | * | |
| cisco | ace_xml_gateway | 5.2 | |
| cisco | ace_xml_gateway | 6.0 | |
| cisco | mds_9120 | * | |
| cisco | mds_9124 | * | |
| cisco | mds_9134 | * | |
| cisco | mds_9140 | * | |
| ingate | ingate_firewall | 2.2.0 | |
| ingate | ingate_firewall | 2.2.1 | |
| ingate | ingate_firewall | 2.2.2 | |
| ingate | ingate_firewall | 2.3.0 | |
| ingate | ingate_firewall | 2.4.0 | |
| ingate | ingate_firewall | 2.4.1 | |
| ingate | ingate_firewall | 2.5.0 | |
| ingate | ingate_firewall | 2.6.0 | |
| ingate | ingate_firewall | 2.6.1 | |
| ingate | ingate_firewall | 3.0.2 | |
| ingate | ingate_firewall | 3.1.0 | |
| ingate | ingate_firewall | 3.1.1 | |
| ingate | ingate_firewall | 3.1.3 | |
| ingate | ingate_firewall | 3.1.4 | |
| ingate | ingate_firewall | 3.2.0 | |
| ingate | ingate_firewall | 3.2.1 | |
| ingate | ingate_firewall | 3.2.2 | |
| ingate | ingate_firewall | 3.3.1 | |
| ingate | ingate_firewall | 4.1.0 | |
| ingate | ingate_firewall | 4.1.3 | |
| ingate | ingate_firewall | 4.2.1 | |
| ingate | ingate_firewall | 4.2.2 | |
| ingate | ingate_firewall | 4.2.3 | |
| ingate | ingate_firewall | 4.3.1 | |
| ingate | ingate_firewall | 4.4.1 | |
| ingate | ingate_firewall | 4.4.2 | |
| ingate | ingate_firewall | 4.5.1 | |
| ingate | ingate_firewall | 4.5.2 | |
| ingate | ingate_firewall | 4.6.0 | |
| ingate | ingate_firewall | 4.6.1 | |
| ingate | ingate_firewall | 4.6.2 | |
| ingate | ingate_siparator | 2.2.0 | |
| ingate | ingate_siparator | 2.2.1 | |
| ingate | ingate_siparator | 2.2.2 | |
| ingate | ingate_siparator | 2.3.0 | |
| ingate | ingate_siparator | 2.4.0 | |
| ingate | ingate_siparator | 2.4.1 | |
| ingate | ingate_siparator | 2.5.0 | |
| ingate | ingate_siparator | 2.6.0 | |
| ingate | ingate_siparator | 2.6.1 | |
| ingate | ingate_siparator | 3.0.2 | |
| ingate | ingate_siparator | 3.1.0 | |
| ingate | ingate_siparator | 3.1.1 | |
| ingate | ingate_siparator | 3.1.3 | |
| ingate | ingate_siparator | 3.1.4 | |
| ingate | ingate_siparator | 3.2.0 | |
| ingate | ingate_siparator | 3.2.1 | |
| ingate | ingate_siparator | 3.2.2 | |
| ingate | ingate_siparator | 3.3.1 | |
| ingate | ingate_siparator | 4.1.0 | |
| ingate | ingate_siparator | 4.1.3 | |
| ingate | ingate_siparator | 4.2.1 | |
| ingate | ingate_siparator | 4.2.2 | |
| ingate | ingate_siparator | 4.2.3 | |
| ingate | ingate_siparator | 4.3.1 | |
| ingate | ingate_siparator | 4.3.4 | |
| ingate | ingate_siparator | 4.4.1 | |
| ingate | ingate_siparator | 4.4.2 | |
| ingate | ingate_siparator | 4.5.1 | |
| ingate | ingate_siparator | 4.5.2 | |
| ingate | ingate_siparator | 4.6.0 | |
| ingate | ingate_siparator | 4.6.1 | |
| ingate | ingate_siparator | 4.6.2 | |
| juniper | session_and_resource_control | 1.0 | |
| juniper | session_and_resource_control | 2.0 | |
| juniper | src_pe | 1.0 | |
| juniper | src_pe | 2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5CAC7FBF-2493-42CA-9B23-20AF09F0DDA8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DE64E4C4-BACE-404F-966D-415976781DC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "377F951F-C2D8-441D-A532-F62E23937F94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "34A3A284-36A9-4E8C-815D-6E2FE4C158DF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
"matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
"matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
"matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
"matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*",
"matchCriteriaId": "EB593071-BB5A-47AD-B9C6-59D2010F6280",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
"matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
"matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
"matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
"matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
"matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*",
"matchCriteriaId": "6E2D6402-D2AF-4817-8A46-1FA9B17B720C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
"matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
"matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*",
"matchCriteriaId": "2A419BD7-6345-43D8-B69C-2255E2EF6FD7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
"matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
"matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
"matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
"matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
"matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
"matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
"matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
"matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
"matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
"matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
"matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
"matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
"matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
"matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
"matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
"matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
"matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
"matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
"matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
"matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
"matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
"matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
"matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
"matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
"matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "79528F96-FD42-4A76-82EE-4B1324D53B5F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D626B494-6210-4F74-8D17-BA480B6665C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FB31FAC-D720-4BF1-BFCC-0A9B714E292A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "904CA41E-8168-41DE-AE84-941962A7BB71",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8D69F8FA-D58A-4F53-86D8-A20C73E9B299",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD331C50-DB93-4001-B56A-C1012F894CDF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "75538529-611A-43B5-AC4D-089C4E2E2ACC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F992D03D-1DB8-44C1-B59D-1C09A32A2C91",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8BC298-4AF9-4281-9AD9-0D8F621E46B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F2FE436B-2117-4FB4-B550-8454848D1D58",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69D2BD63-C110-4E89-B239-4A59E20AB78E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*",
"matchCriteriaId": "43E5FFB6-861D-4F91-B3C9-C5E57DDD25C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1BD3BD3D-767D-483D-9FFE-D23AA2E228E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6762126F-55E4-4963-99F5-206A46979E7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1945B97A-8276-4EE2-8F76-5F0C0956DF18",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8CA81F-2AB6-45F8-8AAE-BF6A7EDA73D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F2452913-0513-46BB-A52E-8FA12D77B570",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "5D967624-23B1-48BB-91DB-1E1C18AAAD85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "18CCF3B9-CA7D-4D37-BD2C-1B74586B98A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A0AB8C2-EE95-48AA-98B7-B6ED40494A0A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "77930529-89BE-463D-8259-3D67D153284A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "743DEB17-3BE3-4278-A54B-2CE547DB9F31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0DCAF8C2-0E4E-4474-BD1E-F28A6EAEF8F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D2BCA127-F5F3-418F-890D-6B1C03019590",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5A2C2F-ABF4-46B0-80AB-867B97AE5237",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BE83150C-456E-462A-A0F1-ED8EAD60D671",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BF5B2431-335C-461B-B07F-88267EA71DCD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9DBA8E67-021A-4D07-94B9-943A8E1C4468",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "905D1F04-CDFD-4BAD-8939-5ABC70A874E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "00878E69-2721-43E3-A853-D3DCFE5C258D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C51799BB-D931-436C-8C94-558956AC880A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A1ACC549-B5AF-4F5C-A3FE-257AA6D80C7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D498D406-A453-4119-BBA1-4709CF5862AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8D68555E-BEB9-4F1E-8D6D-C313FB501523",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7B44A0D4-3020-414B-81D7-679E8441E182",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*",
"matchCriteriaId": "B76A8BD4-E53F-49A6-946B-6E672DD0419C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C6B46B-13E2-4DA4-9EF2-007893034269",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C501EB-CF9F-437D-A7C0-2A12F1D5E171",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "538FE81A-2FD9-4A7C-AEC7-8FCE98DADBE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15D3471D-6267-4481-8BBD-BFC106E8F30B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13FB3C8A-87D3-4601-BD97-2B9F9FA8CA47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0292228-80D8-4BA4-8662-698D7003D7D0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFD21CF-CC38-477F-A78B-10CFEFF81E0A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "522C9080-86A6-40A8-905C-73187DAF83F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B7A18-F230-44D4-801E-8284085CA1DF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E62CC4C-89A7-4594-BDD8-394211889220",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E152F995-BCD2-4725-A47C-1A5E7D6B9005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51E38404-ED69-4B0E-A035-2AF5E0649CC1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A90F0A06-A634-4BD0-A477-90BD3384B7D0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "346E0D1B-CF9E-48BC-AE7A-F8CEF09F6741",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0123D2ED-3983-45D3-B54A-3E75FCE99C6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "66CA6C29-1DF1-46E3-BDCA-9ED72D3E6731",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E50E974E-87F5-45A2-88BA-B1E4913E3DAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4AB25CC-BB96-4675-98D7-C5FF30C24014",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7C95AD-3D5F-458B-A761-5D7779FEA327",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E4A3F6-5D89-47D0-84AD-601682399D8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C700A36D-5FB4-475D-BE85-74511830870A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "02060365-1D67-4611-8D79-B9FC354EBF99",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "194BD880-F672-4492-8356-B14C8DA8C2DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D769FC-3081-48F8-BBF1-3964F3F8B569",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A966DB26-8A52-4F4D-9C0E-8A8719A195AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E6675DF0-963A-4091-9786-7CE3337EE47E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "77A94931-8584-4021-A5BB-83FF22D54955",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FB120-9BB3-4363-B2A2-A3475993FDFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8229DE3A-B9CB-44FF-8409-51E09DDED479",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAD7A89-294A-45DA-B5F5-C69F7FCC4A5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2699E7A6-7B3A-4C4C-9472-B8B6B547624D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D913348F-351C-4D78-A0AA-27B355D52235",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C3E88A46-CEC7-46D5-9697-232E18531FD5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5F16B8D0-81F5-4ECE-8276-EC30DDCCE1A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECFBAFE-9267-469A-A97F-F716969B247C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "48F839C7-7B33-4BF6-9ACF-76F32F5D7C72",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1559E6-E7B6-4B5B-8841-CF502E05BA46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F041246F-5B7F-4F63-9E81-02465C9062C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB78013-DEE9-438E-ABD1-5E3D932177BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D77447C3-AA72-4CAB-A0B1-0883D41AD064",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "473038C0-1644-4FF2-A1DA-BCB8A7CD1CA2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9C3F04F-7581-4DCA-970D-9FCBB56EA724",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABF04A7-8230-4AB9-8D66-DF1463037823",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC205E36-7027-4A9B-8574-9BB9C68007A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69C55DD7-986A-4AB6-8F61-5A5D26531011",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "84DDD7E4-D5D7-4341-9482-2B918306578D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "14A3C59C-6A3D-477B-B425-1C085D6951E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "31AA57F4-5023-4333-9F19-C9D362E8E495",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "063034FF-0AB8-4D78-9822-0DCA9657C853",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "67477EC7-363E-45B5-BA53-1A4E9FB20CDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "78E11F95-E635-465C-BD7F-5F7E9192DEAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74F145F0-573E-4CBC-AB69-3B77D6F9A540",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "49DA7D86-8845-43CA-80DC-3D794322CB28",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD34FEB-7956-44AE-A510-2E5F9EF61651",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DEF5098-3791-4CEB-A436-2809A4385D27",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5D895880-FB98-4472-A164-458CE086F339",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D7912AA3-0469-479E-9C5A-53F20E504956",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8677C6C8-39CA-492A-A196-9DFAF892120C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51FA6F2A-8444-4BB2-B7F2-B97AEFFF9E27",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "60E46CAD-0032-4CD6-AA2A-871E1DFC3A35",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22CE55DE-00CA-4F87-9CA0-80A360E332FA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "63DC81FA-A6B4-41DC-8097-8944D06A2451",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB87853E-CAFF-48D8-9C56-A2DE325235D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "61E35451-BEE3-412A-8706-5522C00BE1DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E599E0CE-CCB7-4A30-8AA9-45BBC11AFEC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F45326B3-CC4E-4C3A-9819-28936A0432F4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CDBF1A78-7190-4326-84BD-C18CC354DA38",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D97FFBA0-2E80-40EF-A4AC-F26D3490371E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A442F5B-5A1A-4CD0-B693-851FFB917E5D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "074BCB70-AD66-4141-9DD3-9DE73BDCB0F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "646BF70F-CB7B-48E3-8563-E089E1CECD11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD34A7B-508C-45F2-8725-FE42398D3652",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D2785732-A5C7-434E-B45D-13138B574F45",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "989A4E8A-F23D-4BF5-B860-FB7B04A1CE56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A07E1241-24BE-48D3-B737-56B2AAA3AF64",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB751FD-CCCA-4131-A24F-65DEF1128B26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D106F4E4-4B41-4002-8C34-6A9C3A0FF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "863583DC-DD93-46DC-BA06-0B838CDB2565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D50E1B4-A64E-45D5-8A44-947DE7B8AAD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5F1A8F-5ED9-4ED0-A336-A0E4A439E6F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte."
},
{
"lang": "es",
"value": "Una comprobaci\u00f3n SNMPv3 HMAC en (1) Net-SNMP versi\u00f3n 5.2.x anterior a 5.2.4.1, versi\u00f3n 5.3.x anterior a 5.3.2.1 y versi\u00f3n 5.4.x anterior a 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series versi\u00f3n 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (tambi\u00e9n se conoce como Network Appliance) ONTAP versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versi\u00f3n anterior a 16.2; (7) m\u00faltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall versi\u00f3n 3.1.0 y posterior y SIParator versi\u00f3n 3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent versi\u00f3n 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticaci\u00f3n SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte."
}
],
"id": "CVE-2008-0960",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-06-10T18:32:00.000",
"references": [
{
"source": "cret@cert.org",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"source": "cret@cert.org",
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"source": "cret@cert.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"source": "cret@cert.org",
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"source": "cret@cert.org",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30574"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30596"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/30612"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30615"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30626"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30647"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30648"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30665"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30802"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31334"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31351"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31467"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31568"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32664"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33003"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/35463"
},
{
"source": "cret@cert.org",
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"source": "cret@cert.org",
"url": "http://securityreason.com/securityalert/3933"
},
{
"source": "cret@cert.org",
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"source": "cret@cert.org",
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"source": "cret@cert.org",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"source": "cret@cert.org",
"url": "http://support.apple.com/kb/HT2163"
},
{
"source": "cret@cert.org",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"source": "cret@cert.org",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
},
{
"source": "cret@cert.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
},
{
"source": "cret@cert.org",
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"source": "cret@cert.org",
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"source": "cret@cert.org",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
},
{
"source": "cret@cert.org",
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"source": "cret@cert.org",
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"source": "cret@cert.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/29623"
},
{
"source": "cret@cert.org",
"url": "http://www.securitytracker.com/id?1020218"
},
{
"source": "cret@cert.org",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
},
{
"source": "cret@cert.org",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
},
{
"source": "cret@cert.org",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"source": "cret@cert.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"source": "cret@cert.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
},
{
"source": "cret@cert.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
},
{
"source": "cret@cert.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
},
{
"source": "cret@cert.org",
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"source": "cret@cert.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
},
{
"source": "cret@cert.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
},
{
"source": "cret@cert.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30574"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30596"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30612"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30615"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30626"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30647"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30665"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31351"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31467"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31568"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35463"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3933"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT2163"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/29623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020218"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2008-0960
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2008-0960",
"description": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.",
"id": "GSD-2008-0960",
"references": [
"https://www.suse.com/security/cve/CVE-2008-0960.html",
"https://www.debian.org/security/2008/dsa-1663",
"https://access.redhat.com/errata/RHSA-2008:0529",
"https://access.redhat.com/errata/RHSA-2008:0528",
"https://linux.oracle.com/cve/CVE-2008-0960.html",
"https://packetstormsecurity.com/files/cve/CVE-2008-0960"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-0960"
],
"details": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.",
"id": "GSD-2008-0960",
"modified": "2023-12-13T01:22:58.339505Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2008-0960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"name": "35463",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35463"
},
{
"name": "30615",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30615"
},
{
"name": "http://support.apple.com/kb/HT2163",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "ADV-2008-1787",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"name": "30648",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30648"
},
{
"name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
},
{
"name": "32664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32664"
},
{
"name": "ADV-2008-1981",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "ADV-2008-1801",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"name": "SUSE-SA:2008:039",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
"refsource": "MLIST",
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"name": "31351",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31351"
},
{
"name": "ADV-2008-1788",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
},
{
"name": "FEDORA-2008-5215",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
},
{
"name": "29623",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29623"
},
{
"name": "31334",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31334"
},
{
"name": "ADV-2008-2971",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"name": "oval:org.mitre.oval:def:10820",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
},
{
"name": "oval:org.mitre.oval:def:6414",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
},
{
"name": "30626",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30626"
},
{
"name": "SSRT080082",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
},
{
"name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"name": "HPSBMA02439",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"name": "VU#878044",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"name": "30647",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30647"
},
{
"name": "238865",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"name": "ADV-2008-1836",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"name": "33003",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33003"
},
{
"name": "20080610 SNMP Version 3 Authentication Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"name": "ADV-2008-2361",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"name": "31568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31568"
},
{
"name": "31467",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31467"
},
{
"name": "APPLE-SA-2008-06-30",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "DSA-1663",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "TA08-162A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-006.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"name": "RHSA-2008:0528",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"name": "3933",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3933"
},
{
"name": "RHSA-2008:0529",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
},
{
"name": "30612",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30612"
},
{
"name": "30802",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30802"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
},
{
"name": "5790",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"name": "ADV-2008-1797",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"name": "GLSA-200808-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
},
{
"name": "30665",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30665"
},
{
"name": "FEDORA-2008-5218",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
},
{
"name": "FEDORA-2008-5224",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
},
{
"name": "ADV-2008-1800",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"name": "MDVSA-2008:118",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
},
{
"name": "USN-685-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=833770",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"name": "1020218",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020218"
},
{
"name": "30596",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30596"
},
{
"name": "oval:org.mitre.oval:def:5785",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
},
{
"name": "ADV-2009-1612",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"name": "30574",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30574"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2008-0960"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2008/06/09/1"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-006.html",
"refsource": "MISC",
"tags": [],
"url": "http://www.ocert.org/advisories/ocert-2008-006.html"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=833770",
"refsource": "CONFIRM",
"tags": [],
"url": "http://sourceforge.net/forum/forum.php?forum_id=833770"
},
{
"name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380",
"refsource": "CONFIRM",
"tags": [],
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380"
},
{
"name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
"refsource": "CONFIRM",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
"refsource": "CONFIRM",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z"
},
{
"name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
"refsource": "CONFIRM",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974"
},
{
"name": "RHSA-2008:0528",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html"
},
{
"name": "VU#878044",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/878044"
},
{
"name": "29623",
"refsource": "BID",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/29623"
},
{
"name": "30574",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30574"
},
{
"name": "30596",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30596"
},
{
"name": "TA08-162A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html"
},
{
"name": "31334",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31334"
},
{
"name": "238865",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1"
},
{
"name": "FEDORA-2008-5218",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"
},
{
"name": "30647",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30647"
},
{
"name": "http://support.apple.com/kb/HT2163",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT2163"
},
{
"name": "APPLE-SA-2008-06-30",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html"
},
{
"name": "30648",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30648"
},
{
"name": "31467",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31467"
},
{
"name": "MDVSA-2008:118",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"
},
{
"name": "FEDORA-2008-5215",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html"
},
{
"name": "30802",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30802"
},
{
"name": "30665",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30665"
},
{
"name": "31351",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31351"
},
{
"name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html"
},
{
"name": "20080610 SNMP Version 3 Authentication Vulnerabilities",
"refsource": "CISCO",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml"
},
{
"name": "FEDORA-2008-5224",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"
},
{
"name": "SUSE-SA:2008:039",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"
},
{
"name": "30626",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30626"
},
{
"name": "GLSA-200808-02",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200808-02.xml"
},
{
"name": "31568",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31568"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
"refsource": "MISC",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
},
{
"name": "DSA-1663",
"refsource": "DEBIAN",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "RHSA-2008:0529",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html"
},
{
"name": "30615",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30615"
},
{
"name": "1020218",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1020218"
},
{
"name": "30612",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30612"
},
{
"name": "32664",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32664"
},
{
"name": "3933",
"refsource": "SREASON",
"tags": [],
"url": "http://securityreason.com/securityalert/3933"
},
{
"name": "33003",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33003"
},
{
"name": "USN-685-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"name": "ADV-2009-1612",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/1612"
},
{
"name": "35463",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35463"
},
{
"name": "SSRT080082",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2"
},
{
"name": "ADV-2008-2361",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/2361"
},
{
"name": "ADV-2008-2971",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/2971"
},
{
"name": "ADV-2008-1836",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1836/references"
},
{
"name": "ADV-2008-1800",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1800/references"
},
{
"name": "ADV-2008-1981",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1981/references"
},
{
"name": "ADV-2008-1797",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1797/references"
},
{
"name": "ADV-2008-1801",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1801/references"
},
{
"name": "ADV-2008-1788",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1788/references"
},
{
"name": "ADV-2008-1787",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1787/references"
},
{
"name": "5790",
"refsource": "EXPLOIT-DB",
"tags": [],
"url": "https://www.exploit-db.com/exploits/5790"
},
{
"name": "oval:org.mitre.oval:def:6414",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414"
},
{
"name": "oval:org.mitre.oval:def:5785",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785"
},
{
"name": "oval:org.mitre.oval:def:10820",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820"
},
{
"name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
},
{
"name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-30T16:25Z",
"publishedDate": "2008-06-10T18:32Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.