Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-2408 (GCVE-0-2009-2408)
Vulnerability from cvelistv5 – Published: 2009-07-30 19:00 – Updated: 2024-08-07 05:52- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:52:14.734Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "36139",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36139"
},
{
"name": "36157",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36157"
},
{
"name": "1022632",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022632"
},
{
"name": "MDVSA-2009:197",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
},
{
"name": "SUSE-SA:2009:048",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
},
{
"name": "MDVSA-2009:216",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
},
{
"name": "SUSE-SR:2009:018",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html"
},
{
"name": "36434",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36434"
},
{
"name": "36088",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36088"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://isc.sans.org/diary.html?storyid=7003"
},
{
"name": "RHSA-2009:1207",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.wired.com/threatlevel/2009/07/kaminsky/"
},
{
"name": "36669",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36669"
},
{
"name": "56723",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/56723"
},
{
"name": "RHSA-2009:1432",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
},
{
"name": "USN-810-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-810-1"
},
{
"name": "oval:org.mitre.oval:def:10751",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751"
},
{
"name": "USN-810-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/810-2/"
},
{
"name": "oval:org.mitre.oval:def:8458",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458"
},
{
"name": "1021030",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h"
},
{
"name": "ADV-2009-3184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "36125",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36125"
},
{
"name": "37098",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37098"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"name": "ADV-2009-2085",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2085"
},
{
"name": "DSA-1874",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1874"
},
{
"name": "MDVSA-2009:217",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:217"
},
{
"name": "[oss-security] 20090903 More CVE-2009-2408 like issues",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-07-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-03T20:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "36139",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36139"
},
{
"name": "36157",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36157"
},
{
"name": "1022632",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022632"
},
{
"name": "MDVSA-2009:197",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
},
{
"name": "SUSE-SA:2009:048",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
},
{
"name": "MDVSA-2009:216",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
},
{
"name": "SUSE-SR:2009:018",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html"
},
{
"name": "36434",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36434"
},
{
"name": "36088",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36088"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://isc.sans.org/diary.html?storyid=7003"
},
{
"name": "RHSA-2009:1207",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.wired.com/threatlevel/2009/07/kaminsky/"
},
{
"name": "36669",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36669"
},
{
"name": "56723",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/56723"
},
{
"name": "RHSA-2009:1432",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
},
{
"name": "USN-810-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-810-1"
},
{
"name": "oval:org.mitre.oval:def:10751",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751"
},
{
"name": "USN-810-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/810-2/"
},
{
"name": "oval:org.mitre.oval:def:8458",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458"
},
{
"name": "1021030",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h"
},
{
"name": "ADV-2009-3184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "36125",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36125"
},
{
"name": "37098",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37098"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"name": "ADV-2009-2085",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2085"
},
{
"name": "DSA-1874",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1874"
},
{
"name": "MDVSA-2009:217",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:217"
},
{
"name": "[oss-security] 20090903 More CVE-2009-2408 like issues",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2009-2408",
"datePublished": "2009-07-30T19:00:00.000Z",
"dateReserved": "2009-07-09T00:00:00.000Z",
"dateUpdated": "2024-08-07T05:52:14.734Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-2408\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-07-30T19:30:00.313\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.\"},{\"lang\":\"es\",\"value\":\"Mozilla Firefox anterior a v3.5 y NSS anterior a v3.12.3 no tratan apropiadamente un car\u00e1cter \u0027\\\\0\u0027 en un nombre de dominio en el campo nombre com\u00fan (CN) del asunto de un certificado X.509, que permite a un atacante de hombre-en-el-medio suplantar servidores SSL arbitrarios a trav\u00e9s de un certificado manipulado por una autoridad de certificaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0.13\",\"matchCriteriaId\":\"311A4763-8018-4394-946D-C75220572EA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.12.3\",\"matchCriteriaId\":\"A21F310D-7D9F-45D7-974D-C615F99FBEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.18\",\"matchCriteriaId\":\"336E3C0C-0197-40FD-AD68-C13C518858C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.0.0.23\",\"matchCriteriaId\":\"C213A6FE-549A-4B85-BCBE-11CAF63A376C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.3\",\"versionEndIncluding\":\"11.1\",\"matchCriteriaId\":\"FF141FBE-4CA5-4695-94A0-8BE1309D28CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1608E282-2E96-4447-848D-DBE915DB0EF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD2D897-E321-4CED-92E0-11A98B52053C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}]}]}],\"references\":[{\"url\":\"http://isc.sans.org/diary.html?storyid=7003\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://osvdb.org/56723\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36088\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36125\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36139\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36157\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36434\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36669\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/37098\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1874\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:197\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:216\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:217\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mozilla.org/security/announce/2009/mfsa2009-42.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2009_48_firefox.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1207.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1432.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securitytracker.com/id?1022632\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-810-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2085\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.wired.com/threatlevel/2009/07/kaminsky/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Press/Media Coverage\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=510251\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://usn.ubuntu.com/810-2/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://isc.sans.org/diary.html?storyid=7003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://osvdb.org/56723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36088\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36125\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36434\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/37098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1874\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:197\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mozilla.org/security/announce/2009/mfsa2009-42.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2009_48_firefox.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1207.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1432.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securitytracker.com/id?1022632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-810-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.wired.com/threatlevel/2009/07/kaminsky/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=510251\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://usn.ubuntu.com/810-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}"
}
}
CERTA-2009-AVI-350
Vulnerability from certfr_avis - Published: 2009-08-25 - Updated: 2009-08-25
Une vulnérabilité permettant de contourner la politique de sécurité et de porter atteinte à la confidentialité des données a été découverte dans Mozilla Thunderbird.
Description
Une vulnérabilité a été découverte dans l'exploitation des certificats SSL par le client de messagerie Mozilla Thunderbird. L'exploitation de cette vulnérabilité permet à un utilisateur malveillant de compromettre la confidentialité des données échangées.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mozilla Thunderbird version 2.0.0.22 et versions antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eMozilla Thunderbird version 2.0.0.22 et versions ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans l\u0027exploitation des certificats\nSSL par le client de messagerie Mozilla Thunderbird. L\u0027exploitation de\ncette vuln\u00e9rabilit\u00e9 permet \u00e0 un utilisateur malveillant de compromettre\nla confidentialit\u00e9 des donn\u00e9es \u00e9chang\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
}
],
"initial_release_date": "2009-08-25T00:00:00",
"last_revision_date": "2009-08-25T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-42 du 01 ao\u00fbt 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"title": "Note de mise \u00e0 jour de Mozilla Thunderbird 2.0.0.23 du 20 ao\u00fbt 2009 :",
"url": "http://www.mozilla-europe.org/fr/products/thunderbird/2.0.0.23/teleasenotes/"
}
],
"reference": "CERTA-2009-AVI-350",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-08-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 permettant de contourner la politique de s\u00e9curit\u00e9 et\nde porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es a \u00e9t\u00e9 d\u00e9couverte\ndans Mozilla Thunderbird.\n",
"title": "Vuln\u00e9rabilit\u00e9 du client de messagerie Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de mise \u00e0 jour de Mozilla Thunderbird 2.0.0.23 du 20 ao\u00fbt 2009",
"url": null
}
]
}
CERTA-2009-AVI-562
Vulnerability from certfr_avis - Published: 2009-12-31 - Updated: 2009-12-31
Une vulnérabilité présente dans Sendmail permet à un utilisateur distant de porter atteinte à la confidentialité et à l'intégrité des données ou de contourner la politique de sécurité.
Description
Une faiblesse dans la mise en œuvre de la couche SSL dans Sendmail a été identifiée. Un utilisateur distant peut ainsi porter atteinte à la confidentialité et à l'intégrité des données ou contourner la politique de sécurité par le biais de certificats construits de façon particulière.
Solution
La version 8.14.4 de Sendmail corrige le problème :
http://www.sendmail.org/releases/8.14.4
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Sendmail versions 8.14.3 et antérieures.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eSendmail versions 8.14.3 et ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nUne faiblesse dans la mise en \u0153uvre de la couche SSL dans Sendmail a \u00e9t\u00e9\nidentifi\u00e9e. Un utilisateur distant peut ainsi porter atteinte \u00e0 la\nconfidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es ou contourner la politique\nde s\u00e9curit\u00e9 par le biais de certificats construits de fa\u00e7on\nparticuli\u00e8re.\n\n## Solution\n\nLa version 8.14.4 de Sendmail corrige le probl\u00e8me :\n\n http://www.sendmail.org/releases/8.14.4\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
}
],
"initial_release_date": "2009-12-31T00:00:00",
"last_revision_date": "2009-12-31T00:00:00",
"links": [],
"reference": "CERTA-2009-AVI-562",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-12-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans Sendmail permet \u00e0 un utilisateur distant\nde porter atteinte \u00e0 la confidentialit\u00e9 et \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es ou\nde contourner la politique de s\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Sendmail",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Sendmail du 30 d\u00e9cembre 2009",
"url": "http://www.sendmail.org/releases/8.14.4"
}
]
}
CERTA-2009-AVI-306
Vulnerability from certfr_avis - Published: 2009-08-04 - Updated: 2009-08-04
Plusieurs vulnérabilités affectent le navigateur Firefox et permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités affectent le navigateur Firefox :
- la différence de traitement des noms d'hôtes contenant un caractère null illégal par les autorités de certification, lors de la demande de certificat par le serveur, et par le navigateur, lors de l'établissement d'une session SSL, permet à un utilisateur malveillant de lire ou de modifier des données dans une transaction sécurisée par SSL. Cette vulnérabilité permet à utilisateur malveillant d'exécuter du code arbitraire à distance au travers du système de mise à jour ;
- le traitement d'expression régulière dans les certificats de clefs publiques restait compatible avec celui des navigateurs Netscape. Ce traitement laxiste permet à un utilisateur malveillant d'exécuter du code arbitraire à distance en présentant au navigateur un certificat spécialement conçu ;
- le contenu de la barre d'adresse peut ne pas être conforme au contenu de la fenêtre principale. Cette vulnérabilité permet à un utilisateur malveillant de contourner la politique de sécurité en trompant l'utilisateur sur l'identité du site sur lequel il navigue.
Solution
Les versions 3.5.2 et 3.0.13 corrigent ces vulnérabilités.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Firefox 3.0.x et 3.5.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eFirefox 3.0.x et 3.5.x.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectent le navigateur Firefox :\n\n- la diff\u00e9rence de traitement des noms d\u0027h\u00f4tes contenant un caract\u00e8re\n null ill\u00e9gal par les autorit\u00e9s de certification, lors de la demande\n de certificat par le serveur, et par le navigateur, lors de\n l\u0027\u00e9tablissement d\u0027une session SSL, permet \u00e0 un utilisateur\n malveillant de lire ou de modifier des donn\u00e9es dans une transaction\n s\u00e9curis\u00e9e par SSL. Cette vuln\u00e9rabilit\u00e9 permet \u00e0 utilisateur\n malveillant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au travers du\n syst\u00e8me de mise \u00e0 jour ;\n- le traitement d\u0027expression r\u00e9guli\u00e8re dans les certificats de clefs\n publiques restait compatible avec celui des navigateurs Netscape. Ce\n traitement laxiste permet \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du\n code arbitraire \u00e0 distance en pr\u00e9sentant au navigateur un certificat\n sp\u00e9cialement con\u00e7u ;\n- le contenu de la barre d\u0027adresse peut ne pas \u00eatre conforme au\n contenu de la fen\u00eatre principale. Cette vuln\u00e9rabilit\u00e9 permet \u00e0 un\n utilisateur malveillant de contourner la politique de s\u00e9curit\u00e9 en\n trompant l\u0027utilisateur sur l\u0027identit\u00e9 du site sur lequel il navigue.\n\n## Solution\n\nLes versions 3.5.2 et 3.0.13 corrigent ces vuln\u00e9rabilit\u00e9s.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"name": "CVE-2009-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2654"
},
{
"name": "CVE-2009-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2404"
}
],
"initial_release_date": "2009-08-04T00:00:00",
"last_revision_date": "2009-08-04T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-44 du 03 ao\u00fbt 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-44.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-42 du 01 ao\u00fbt 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-43 du 01 ao\u00fbt 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-43.html"
}
],
"reference": "CERTA-2009-AVI-306",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-08-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s affectent le navigateur Firefox et permettent \u00e0\nun utilisateur malveillant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla 2009/mfsa2009-42 \u00e0 44",
"url": null
}
]
}
CERTA-2009-AVI-487
Vulnerability from certfr_avis - Published: 2009-11-10 - Updated: 2009-11-10
De multiples vulnérabilités dans Apple MacOS X permettent entre autres l'exécution de code arbitraire à distance.
Description
L'éditeur Apple a publié un ensemble de correctifs pour les applications livrées avec son système d'exploitation Mac OS X. L'exploitation des vulnérabilités par une personne malintentionnée pourrait permettre, entre autres, l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.5 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.6.",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nL\u0027\u00e9diteur Apple a publi\u00e9 un ensemble de correctifs pour les applications\nlivr\u00e9es avec son syst\u00e8me d\u0027exploitation Mac OS X. L\u0027exploitation des\nvuln\u00e9rabilit\u00e9s par une personne malintentionn\u00e9e pourrait permettre,\nentre autres, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2832",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2832"
},
{
"name": "CVE-2009-3293",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3293"
},
{
"name": "CVE-2009-2820",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2820"
},
{
"name": "CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"name": "CVE-2009-3292",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3292"
},
{
"name": "CVE-2009-2839",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2839"
},
{
"name": "CVE-2009-2825",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2825"
},
{
"name": "CVE-2009-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2810"
},
{
"name": "CVE-2009-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2411"
},
{
"name": "CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2798"
},
{
"name": "CVE-2007-6698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6698"
},
{
"name": "CVE-2009-2833",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2833"
},
{
"name": "CVE-2009-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2203"
},
{
"name": "CVE-2009-2823",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2823"
},
{
"name": "CVE-2009-2840",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2840"
},
{
"name": "CVE-2009-2824",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2824"
},
{
"name": "CVE-2009-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2819"
},
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"name": "CVE-2009-2838",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2838"
},
{
"name": "CVE-2009-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1632"
},
{
"name": "CVE-2009-2818",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2818"
},
{
"name": "CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"name": "CVE-2007-5707",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5707"
},
{
"name": "CVE-2008-0658",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0658"
},
{
"name": "CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"name": "CVE-2009-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1195"
},
{
"name": "CVE-2009-1191",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1191"
},
{
"name": "CVE-2009-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2808"
},
{
"name": "CVE-2009-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2830"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2009-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3111"
},
{
"name": "CVE-2009-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2829"
},
{
"name": "CVE-2009-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2826"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2285"
},
{
"name": "CVE-2009-3291",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3291"
},
{
"name": "CVE-2009-2837",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2837"
},
{
"name": "CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"name": "CVE-2009-2836",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2836"
},
{
"name": "CVE-2009-2799",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2799"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2009-2835",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2835"
},
{
"name": "CVE-2009-2831",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2831"
},
{
"name": "CVE-2009-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3235"
},
{
"name": "CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
},
{
"name": "CVE-2009-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2828"
},
{
"name": "CVE-2009-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2202"
}
],
"initial_release_date": "2009-11-10T00:00:00",
"last_revision_date": "2009-11-10T00:00:00",
"links": [],
"reference": "CERTA-2009-AVI-487",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans Apple MacOS X permettent entre autres\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple MacOS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3937 du 09 novembre 2009",
"url": "http://docs.info.apple.com/article.html?artnum=HT3937"
}
]
}
CERTA-2010-AVI-008
Vulnerability from certfr_avis - Published: 2010-01-08 - Updated: 2010-01-08
Plusieurs vulnérabilités dans VMware ESX permettent, entre autre, à une personne malintentionnée d'exécuter du code arbitraire à distance
Description
De multiples vulnérabilités, non documentées, dans VMware ESX permettent, entre autre, à une personne distante malintentionnée d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
VMware ESX 4.0 sans le correctif ESX400-200912403-SG.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVMware ESX 4.0 sans le correctif ESX400-200912403-SG.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s, non document\u00e9es, dans VMware ESX\npermettent, entre autre, \u00e0 une personne distante malintentionn\u00e9e\nd\u0027ex\u00e9cuter du code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3375",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3375"
},
{
"name": "CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"name": "CVE-2009-3380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3380"
},
{
"name": "CVE-2009-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3382"
},
{
"name": "CVE-2009-3274",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3274"
},
{
"name": "CVE-2009-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2404"
},
{
"name": "CVE-2009-3372",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3372"
},
{
"name": "CVE-2009-3376",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3376"
},
{
"name": "CVE-2009-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1563"
},
{
"name": "CVE-2009-3373",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3373"
},
{
"name": "CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"name": "CVE-2009-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3374"
},
{
"name": "CVE-2009-3370",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3370"
}
],
"initial_release_date": "2010-01-08T00:00:00",
"last_revision_date": "2010-01-08T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2010-0001 du 06 janvier 2010 :",
"url": "http://lists.vmware.com/pipermail/security-announce/2010/000075.html"
}
],
"reference": "CERTA-2010-AVI-008",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans VMware ESX permettent, entre autre, \u00e0 une\npersonne malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance\n",
"title": "Mulitples vuln\u00e9rabilit\u00e9s dans VMware ESX",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2010-0001 du 06 janvier 2010",
"url": null
}
]
}
CERTA-2009-AVI-338
Vulnerability from certfr_avis - Published: 2009-08-17 - Updated: 2009-08-21
Une vulnérabilité dans cURL et libcurl permet à un utilisateur malveillant de contourner la politique de sécurité.
Description
Une vulnérabilité est présente dans cURL et libcurl qui, quand OpenSSL est utilisé, permet à un utilisateur malveillant de tromper l'utilisateur sur l'identité du serveur auquel il est connecté.
Solution
La version 7.19.6 remédie à cette vulnérabilité. Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
cURL et libcurl, jusqu'à la version 7.19.5.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003ecURL et libcurl, jusqu\u0027\u00e0 la version 7.19.5.\u003c/p\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 est pr\u00e9sente dans cURL et libcurl qui, quand OpenSSL\nest utilis\u00e9, permet \u00e0 un utilisateur malveillant de tromper\nl\u0027utilisateur sur l\u0027identit\u00e9 du serveur auquel il est connect\u00e9.\n\n## Solution\n\nLa version 7.19.6 rem\u00e9die \u00e0 cette vuln\u00e9rabilit\u00e9. Se r\u00e9f\u00e9rer au bulletin\nde s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section\nDocumentation).\n",
"cves": [
{
"name": "CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"name": "CVE-2009-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
}
],
"initial_release_date": "2009-08-17T00:00:00",
"last_revision_date": "2009-08-21T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2009:1209-1 du 13 ao\u00fbt 2009 :",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1209-1.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-818-1 du 17 ao\u00fbt 2009 :",
"url": "http://www.ubuntu.com/usn/usn-818-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2009:203 du 15 ao\u00fbt 2009 :",
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2009:203"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1869-1 du 19 ao\u00fbt 2009 :",
"url": "http://www.debian.org/security/2009/dsa-1869"
}
],
"reference": "CERTA-2009-AVI-338",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-08-17T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins RedHat et Ubuntu.",
"revision_date": "2009-08-19T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins Mandriva et Debian.",
"revision_date": "2009-08-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans cURL et libcurl permet \u00e0 un utilisateur\nmalveillant de contourner la politique de s\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 de cURL et libcurl",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 du projet cURL du 12 ao\u00fbt 2009",
"url": "http://curl.haxx.se/docs/adv_20090812.txt"
}
]
}
RHSA-2009:1184
Vulnerability from csaf_redhat - Published: 2009-07-30 22:09 - Updated: 2026-01-28 22:51Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated nspr and nss packages that fix security issues and a bug are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Netscape Portable Runtime (NSPR) provides platform independence for non-GUI\noperating system facilities. These facilities include threads, thread\nsynchronization, normal file and network I/O, interval timing, calendar\ntime, basic memory management (malloc and free), and shared library linking.\n\nNetwork Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. Applications built with NSS can support SSLv2, SSLv3, TLS,\nand other security standards.\n\nThese updated packages upgrade NSS from the previous version, 3.12.2, to a\nprerelease of version 3.12.4. The version of NSPR has also been upgraded\nfrom 4.7.3 to 4.7.4. \n\nMoxie Marlinspike reported a heap overflow flaw in a regular expression\nparser in the NSS library used by browsers such as Mozilla Firefox to match\ncommon names in certificates. A malicious website could present a\ncarefully-crafted certificate in such a way as to trigger the heap\noverflow, leading to a crash or, possibly, arbitrary code execution with\nthe permissions of the user running the browser. (CVE-2009-2404)\n\nNote: in order to exploit this issue without further user interaction in\nFirefox, the carefully-crafted certificate would need to be signed by a\nCertificate Authority trusted by Firefox, otherwise Firefox presents the\nvictim with a warning that the certificate is untrusted. Only if the user\nthen accepts the certificate will the overflow take place.\n\nDan Kaminsky discovered flaws in the way browsers such as Firefox handle\nNULL characters in a certificate. If an attacker is able to get a\ncarefully-crafted certificate signed by a Certificate Authority trusted by\nFirefox, the attacker could use the certificate during a man-in-the-middle\nattack and potentially confuse Firefox into accepting it by mistake.\n(CVE-2009-2408)\n\nDan Kaminsky found that browsers still accept certificates with MD2 hash\nsignatures, even though MD2 is no longer considered a cryptographically\nstrong algorithm. This could make it easier for an attacker to create a\nmalicious certificate that would be treated as trusted by a browser. NSS\nnow disables the use of MD2 and MD4 algorithms inside signatures by\ndefault. (CVE-2009-2409)\n\nThese version upgrades also provide a fix for the following bug:\n\n* SSL client authentication failed against an Apache server when it was \nusing the mod_nss module and configured for NSSOCSP. On the client side,\nthe user agent received an error message that referenced \"Error Code:\n-12271\" and stated that establishing an encrypted connection had failed\nbecause the certificate had been rejected by the host.\n\nOn the server side, the nss_error_log under /var/log/httpd/ contained the\nfollowing message:\n\n[error] Re-negotiation handshake failed: Not accepted by client!?\n\nAlso, /var/log/httpd/error_log contained this error:\n\nSSL Library Error: -8071 The OCSP server experienced an internal error\n\nWith these updated packages, the dependency problem which caused this\nfailure has been resolved so that SSL client authentication with an\nApache web server using mod_nss which is configured for NSSOCSP succeeds\nas expected. Note that if the presented client certificate is expired,\nthen access is denied, the user agent is presented with an error message\nabout the invalid certificate, and the OCSP queries are seen in the OCSP\nresponder. Also, similar OCSP status verification happens for SSL server\ncertificates used in Apache upon instance start or restart. (BZ#508027)\n\nAll users of nspr and nss are advised to upgrade to these updated packages,\nwhich resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1184",
"url": "https://access.redhat.com/errata/RHSA-2009:1184"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "508027",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508027"
},
{
"category": "external",
"summary": "510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "512912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1184.json"
}
],
"title": "Red Hat Security Advisory: nspr and nss security and bug fix update",
"tracking": {
"current_release_date": "2026-01-28T22:51:01+00:00",
"generator": {
"date": "2026-01-28T22:51:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2009:1184",
"initial_release_date": "2009-07-30T22:09:00+00:00",
"revision_history": [
{
"date": "2009-07-30T22:09:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-30T18:09:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:51:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"product_id": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el4_8.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_8.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_8.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"product_id": "nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_8.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"product_id": "nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_8.1.ia64",
"product": {
"name": "nspr-0:4.7.4-1.el4_8.1.ia64",
"product_id": "nspr-0:4.7.4-1.el4_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_8.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_8.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_8.2.i386",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.i386",
"product_id": "nss-0:3.12.3.99.3-1.el4_8.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_8.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"product_id": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el4_8.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_8.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_8.1.i386",
"product": {
"name": "nspr-0:4.7.4-1.el4_8.1.i386",
"product_id": "nspr-0:4.7.4-1.el4_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_8.1.i386",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.i386",
"product_id": "nspr-devel-0:4.7.4-1.el4_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_8.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product_id": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el4_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product_id": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_8.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"product_id": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_8.1.x86_64",
"product": {
"name": "nspr-0:4.7.4-1.el4_8.1.x86_64",
"product_id": "nspr-0:4.7.4-1.el4_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_8.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_8.2.src",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.src",
"product_id": "nss-0:3.12.3.99.3-1.el4_8.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_8.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_8.1.src",
"product": {
"name": "nspr-0:4.7.4-1.el4_8.1.src",
"product_id": "nspr-0:4.7.4-1.el4_8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_8.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"product_id": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el4_8.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_8.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_8.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"product_id": "nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_8.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"product_id": "nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_8.1.ppc",
"product": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc",
"product_id": "nspr-0:4.7.4-1.el4_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_8.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_8.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"product_id": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_8.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_8.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_8.1.ppc64",
"product": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc64",
"product_id": "nspr-0:4.7.4-1.el4_8.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_8.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"product_id": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el4_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"product_id": "nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_8.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"product_id": "nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_8.1.s390x",
"product": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390x",
"product_id": "nspr-0:4.7.4-1.el4_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_8.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_8.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390",
"product_id": "nss-0:3.12.3.99.3-1.el4_8.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_8.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"product_id": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el4_8.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_8.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_8.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_8.1.s390",
"product": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390",
"product_id": "nspr-0:4.7.4-1.el4_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_8.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390",
"product_id": "nspr-devel-0:4.7.4-1.el4_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_8.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-0:4.7.4-1.el4_8.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-0:4.7.4-1.el4_8.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-0:3.12.3.99.3-1.el4_8.2.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-0:4.7.4-1.el4_8.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-0:4.7.4-1.el4_8.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-0:4.7.4-1.el4_8.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-0:3.12.3.99.3-1.el4_8.2.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-0:4.7.4-1.el4_8.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-0:4.7.4-1.el4_8.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-0:3.12.3.99.3-1.el4_8.2.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2404",
"discovery_date": "2009-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512912"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss regexp heap overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2404"
},
{
"category": "external",
"summary": "RHBZ#512912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2404"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-30T22:09:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1184"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "nss regexp heap overflow"
},
{
"cve": "CVE-2009-2408",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510251"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "firefox/nss: doesn\u0027t handle NULL in Common Name properly",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2408"
},
{
"category": "external",
"summary": "RHBZ#510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-30T22:09:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1184"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "firefox/nss: doesn\u0027t handle NULL in Common Name properly"
},
{
"cve": "CVE-2009-2409",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510197"
}
],
"notes": [
{
"category": "description",
"text": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "deprecate MD2 in SSL cert validation (Kaminsky)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2409"
},
{
"category": "external",
"summary": "RHBZ#510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-30T22:09:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1184"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:nspr-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-0:4.7.4-1.el4_8.1.src",
"4AS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4AS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4AS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4AS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.src",
"4Desktop:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4Desktop:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4Desktop:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4Desktop:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nspr-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-0:4.7.4-1.el4_8.1.src",
"4ES:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4ES:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4ES:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4ES:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nspr-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-0:4.7.4-1.el4_8.1.src",
"4WS:nspr-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.ppc64",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-debuginfo-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.i386",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ia64",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.ppc",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.s390x",
"4WS:nspr-devel-0:4.7.4-1.el4_8.1.x86_64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.src",
"4WS:nss-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.ppc64",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-debuginfo-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-devel-0:3.12.3.99.3-1.el4_8.2.x86_64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.i386",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ia64",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.ppc",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.s390x",
"4WS:nss-tools-0:3.12.3.99.3-1.el4_8.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "deprecate MD2 in SSL cert validation (Kaminsky)"
}
]
}
RHSA-2009:1186
Vulnerability from csaf_redhat - Published: 2009-07-30 22:20 - Updated: 2026-01-28 22:51Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated nspr and nss packages that fix security issues, bugs, and add an\nenhancement are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.\n\nThe packages with this update are identical to the packages released by\nRHBA-2009:1161 on the 20th of July 2009. They are being reissued as a Red\nHat Security Advisory as they fixed a number of security issues that were\nmade public today. If you are installing these packages for the first time,\nthey also provide a number of bug fixes and add an enhancement, as detailed\nin RHBA-2009:1161. Since the packages are identical, there is no need to\ninstall this update if RHBA-2009:1161 has already been installed.",
"title": "Topic"
},
{
"category": "general",
"text": "Netscape Portable Runtime (NSPR) provides platform independence for non-GUI\noperating system facilities. These facilities include threads, thread\nsynchronization, normal file and network I/O, interval timing, calendar\ntime, basic memory management (malloc and free), and shared library linking.\n\nNetwork Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. Applications built with NSS can support SSLv2, SSLv3, TLS,\nand other security standards.\n\nThese updated packages upgrade NSS from the previous version, 3.12.2, to a\nprerelease of version 3.12.4. The version of NSPR has also been upgraded\nfrom 4.7.3 to 4.7.4. \n\nMoxie Marlinspike reported a heap overflow flaw in a regular expression\nparser in the NSS library used by browsers such as Mozilla Firefox to match\ncommon names in certificates. A malicious website could present a\ncarefully-crafted certificate in such a way as to trigger the heap\noverflow, leading to a crash or, possibly, arbitrary code execution with\nthe permissions of the user running the browser. (CVE-2009-2404)\n\nNote: in order to exploit this issue without further user interaction in\nFirefox, the carefully-crafted certificate would need to be signed by a\nCertificate Authority trusted by Firefox, otherwise Firefox presents the\nvictim with a warning that the certificate is untrusted. Only if the user\nthen accepts the certificate will the overflow take place.\n\nDan Kaminsky discovered flaws in the way browsers such as Firefox handle\nNULL characters in a certificate. If an attacker is able to get a\ncarefully-crafted certificate signed by a Certificate Authority trusted by\nFirefox, the attacker could use the certificate during a man-in-the-middle\nattack and potentially confuse Firefox into accepting it by mistake.\n(CVE-2009-2408)\n\nDan Kaminsky found that browsers still accept certificates with MD2 hash\nsignatures, even though MD2 is no longer considered a cryptographically\nstrong algorithm. This could make it easier for an attacker to create a\nmalicious certificate that would be treated as trusted by a browser. NSS\nnow disables the use of MD2 and MD4 algorithms inside signatures by\ndefault. (CVE-2009-2409)\n\nAll users of nspr and nss are advised to upgrade to these updated packages,\nwhich resolve these issues and add an enhancement.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1186",
"url": "https://access.redhat.com/errata/RHSA-2009:1186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://rhn.redhat.com/errata/RHBA-2009-1161.html",
"url": "http://rhn.redhat.com/errata/RHBA-2009-1161.html"
},
{
"category": "external",
"summary": "510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "512912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1186.json"
}
],
"title": "Red Hat Security Advisory: nspr and nss security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2026-01-28T22:51:01+00:00",
"generator": {
"date": "2026-01-28T22:51:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2009:1186",
"initial_release_date": "2009-07-30T22:20:00+00:00",
"revision_history": [
{
"date": "2009-07-30T22:20:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-30T18:20:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:51:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"product_id": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_3.1.x86_64",
"product": {
"name": "nspr-0:4.7.4-1.el5_3.1.x86_64",
"product_id": "nspr-0:4.7.4-1.el5_3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_id": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_3.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_3.1.i386",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.i386",
"product_id": "nspr-devel-0:4.7.4-1.el5_3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_3.1.i386",
"product": {
"name": "nspr-0:4.7.4-1.el5_3.1.i386",
"product_id": "nspr-0:4.7.4-1.el5_3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_3.2.i386",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.i386",
"product_id": "nss-0:3.12.3.99.3-1.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_3.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_3.1.src",
"product": {
"name": "nspr-0:4.7.4-1.el5_3.1.src",
"product_id": "nspr-0:4.7.4-1.el5_3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_3.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_3.2.src",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.src",
"product_id": "nss-0:3.12.3.99.3-1.el5_3.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_3.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"product_id": "nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_3.1.ia64",
"product": {
"name": "nspr-0:4.7.4-1.el5_3.1.ia64",
"product_id": "nspr-0:4.7.4-1.el5_3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_id": "nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_3.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"product_id": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_3.1.ppc64",
"product": {
"name": "nspr-0:4.7.4-1.el5_3.1.ppc64",
"product_id": "nspr-0:4.7.4-1.el5_3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_3.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_3.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_3.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product_id": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_3.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"product_id": "nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_3.1.ppc",
"product": {
"name": "nspr-0:4.7.4-1.el5_3.1.ppc",
"product_id": "nspr-0:4.7.4-1.el5_3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_id": "nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_3.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"product_id": "nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_3.1.s390x",
"product": {
"name": "nspr-0:4.7.4-1.el5_3.1.s390x",
"product_id": "nspr-0:4.7.4-1.el5_3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_id": "nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_3.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390",
"product_id": "nspr-devel-0:4.7.4-1.el5_3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_3.1.s390",
"product": {
"name": "nspr-0:4.7.4-1.el5_3.1.s390",
"product_id": "nspr-0:4.7.4-1.el5_3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_3.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_3.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_3.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390",
"product_id": "nss-0:3.12.3.99.3-1.el5_3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_3.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-0:4.7.4-1.el5_3.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-0:3.12.3.99.3-1.el5_3.2.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-0:4.7.4-1.el5_3.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-0:3.12.3.99.3-1.el5_3.2.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2404",
"discovery_date": "2009-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512912"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss regexp heap overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2404"
},
{
"category": "external",
"summary": "RHBZ#512912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2404"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-30T22:20:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1186"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "nss regexp heap overflow"
},
{
"cve": "CVE-2009-2408",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510251"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "firefox/nss: doesn\u0027t handle NULL in Common Name properly",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2408"
},
{
"category": "external",
"summary": "RHBZ#510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-30T22:20:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1186"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "firefox/nss: doesn\u0027t handle NULL in Common Name properly"
},
{
"cve": "CVE-2009-2409",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510197"
}
],
"notes": [
{
"category": "description",
"text": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "deprecate MD2 in SSL cert validation (Kaminsky)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2409"
},
{
"category": "external",
"summary": "RHBZ#510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-30T22:20:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1186"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.src",
"5Client-Workstation:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client-Workstation:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client-Workstation:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client-Workstation:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nspr-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-0:4.7.4-1.el5_3.1.src",
"5Client:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Client:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Client:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Client:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nspr-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-0:4.7.4-1.el5_3.1.src",
"5Server:nspr-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-debuginfo-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.i386",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ia64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.ppc64",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.s390x",
"5Server:nspr-devel-0:4.7.4-1.el5_3.1.x86_64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.src",
"5Server:nss-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-debuginfo-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.ppc64",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_3.2.x86_64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.i386",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ia64",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.ppc",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.s390x",
"5Server:nss-tools-0:3.12.3.99.3-1.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "deprecate MD2 in SSL cert validation (Kaminsky)"
}
]
}
RHSA-2009:1432
Vulnerability from csaf_redhat - Published: 2009-09-09 23:48 - Updated: 2026-01-28 22:51Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.
Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "SeaMonkey is an open source Web browser, email and newsgroup client, IRC\nchat client, and HTML editor.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2009-3072, CVE-2009-3075)\n\nA use-after-free flaw was found in SeaMonkey. An attacker could use this\nflaw to crash SeaMonkey or, potentially, execute arbitrary code with the\nprivileges of the user running SeaMonkey. (CVE-2009-3077)\n\nDan Kaminsky discovered flaws in the way browsers such as SeaMonkey handle\nNULL characters in a certificate. If an attacker is able to get a\ncarefully-crafted certificate signed by a Certificate Authority trusted by\nSeaMonkey, the attacker could use the certificate during a\nman-in-the-middle attack and potentially confuse SeaMonkey into accepting\nit by mistake. (CVE-2009-2408)\n\nDescriptions in the dialogs when adding and removing PKCS #11 modules were\nnot informative. An attacker able to trick a user into installing a\nmalicious PKCS #11 module could use this flaw to install their own\nCertificate Authority certificates on a user\u0027s machine, making it possible\nto trick the user into believing they are viewing a trusted site or,\npotentially, execute arbitrary code with the privileges of the user running\nSeaMonkey. (CVE-2009-3076)\n\nA flaw was found in the way SeaMonkey displays the address bar when\nwindow.open() is called in a certain way. An attacker could use this flaw\nto conceal a malicious URL, possibly tricking a user into believing they\nare viewing a trusted site. (CVE-2009-2654)\n\nDan Kaminsky found that browsers still accept certificates with MD2 hash\nsignatures, even though MD2 is no longer considered a cryptographically\nstrong algorithm. This could make it easier for an attacker to create a\nmalicious certificate that would be treated as trusted by a browser. NSS\n(provided by SeaMonkey) now disables the use of MD2 and MD4 algorithms\ninside signatures by default. (CVE-2009-2409)\n\nAll SeaMonkey users should upgrade to these updated packages, which correct\nthese issues. After installing the update, SeaMonkey must be restarted for\nthe changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1432",
"url": "https://access.redhat.com/errata/RHSA-2009:1432"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "521311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521311"
},
{
"category": "external",
"summary": "521688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521688"
},
{
"category": "external",
"summary": "521691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521691"
},
{
"category": "external",
"summary": "521692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521692"
},
{
"category": "external",
"summary": "521693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521693"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1432.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update",
"tracking": {
"current_release_date": "2026-01-28T22:51:03+00:00",
"generator": {
"date": "2026-01-28T22:51:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2009:1432",
"initial_release_date": "2009-09-09T23:48:00+00:00",
"revision_history": [
{
"date": "2009-09-09T23:48:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-09T19:50:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:51:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.45.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.45.el3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-nss-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-mail-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-chat-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-devel-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.45.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.45.el3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.45.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.45.el3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.45.el3.src",
"product": {
"name": "seamonkey-0:1.0.9-0.45.el3.src",
"product_id": "seamonkey-0:1.0.9-0.45.el3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.45.el3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.45.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.45.el3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.45.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.45.el3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-nss-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-mail-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-chat-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-devel-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.45.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.45.el3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.45.el3.src"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.45.el3.src"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.45.el3.src"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.45.el3.src"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2408",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510251"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "firefox/nss: doesn\u0027t handle NULL in Common Name properly",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2408"
},
{
"category": "external",
"summary": "RHBZ#510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-09T23:48:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1432"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "firefox/nss: doesn\u0027t handle NULL in Common Name properly"
},
{
"cve": "CVE-2009-2409",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510197"
}
],
"notes": [
{
"category": "description",
"text": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "deprecate MD2 in SSL cert validation (Kaminsky)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2409"
},
{
"category": "external",
"summary": "RHBZ#510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-09T23:48:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1432"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "deprecate MD2 in SSL cert validation (Kaminsky)"
},
{
"cve": "CVE-2009-2654",
"discovery_date": "2009-08-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521311"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "firefox: URL bar spoofing vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2654"
},
{
"category": "external",
"summary": "RHBZ#521311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521311"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2654"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2654",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2654"
}
],
"release_date": "2009-07-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-09T23:48:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1432"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "firefox: URL bar spoofing vulnerability"
},
{
"cve": "CVE-2009-3072",
"discovery_date": "2009-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521688"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Firefox 3.5.3 3.0.14 browser engine crashes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3072"
},
{
"category": "external",
"summary": "RHBZ#521688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521688"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3072"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3072",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3072"
}
],
"release_date": "2009-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-09T23:48:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1432"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Firefox 3.5.3 3.0.14 browser engine crashes"
},
{
"cve": "CVE-2009-3075",
"discovery_date": "2009-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521691"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Firefox 3.5.2 3.0.14 JavaScript engine crashes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3075"
},
{
"category": "external",
"summary": "RHBZ#521691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3075",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3075"
}
],
"release_date": "2009-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-09T23:48:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1432"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Firefox 3.5.2 3.0.14 JavaScript engine crashes"
},
{
"cve": "CVE-2009-3076",
"discovery_date": "2009-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521692"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3076"
},
{
"category": "external",
"summary": "RHBZ#521692",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521692"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3076"
}
],
"release_date": "2009-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-09T23:48:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1432"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal"
},
{
"cve": "CVE-2009-3077",
"discovery_date": "2009-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521693"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a \"dangling pointer vulnerability.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3077"
},
{
"category": "external",
"summary": "RHBZ#521693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521693"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3077"
}
],
"release_date": "2009-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-09T23:48:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1432"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"3AS:seamonkey-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.45.el3.src",
"3AS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.45.el3.src",
"3ES:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.45.el3.src",
"3WS:seamonkey-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.45.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.45.el3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability"
}
]
}
RHSA-2009:1207
Vulnerability from csaf_redhat - Published: 2009-08-12 14:31 - Updated: 2026-01-28 22:51Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated nspr and nss packages that fix security issues are now available\nfor Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Netscape Portable Runtime (NSPR) provides platform independence for non-GUI\noperating system facilities. These facilities include threads, thread\nsynchronization, normal file and network I/O, interval timing, calendar\ntime, basic memory management (malloc and free), and shared library linking.\n\nNetwork Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. Applications built with NSS can support SSLv2, SSLv3, TLS,\nand other security standards.\n\nThese updated packages upgrade NSS from the previous version, 3.12.2, to a\nprerelease of version 3.12.4. The version of NSPR has also been upgraded\nfrom 4.7.3 to 4.7.4.\n\nMoxie Marlinspike reported a heap overflow flaw in a regular expression\nparser in the NSS library used by browsers such as Mozilla Firefox to match\ncommon names in certificates. A malicious website could present a\ncarefully-crafted certificate in such a way as to trigger the heap\noverflow, leading to a crash or, possibly, arbitrary code execution with\nthe permissions of the user running the browser. (CVE-2009-2404)\n\nNote: in order to exploit this issue without further user interaction in\nFirefox, the carefully-crafted certificate would need to be signed by a\nCertificate Authority trusted by Firefox, otherwise Firefox presents the\nvictim with a warning that the certificate is untrusted. Only if the user\nthen accepts the certificate will the overflow take place.\n\nDan Kaminsky discovered flaws in the way browsers such as Firefox handle\nNULL characters in a certificate. If an attacker is able to get a\ncarefully-crafted certificate signed by a Certificate Authority trusted by\nFirefox, the attacker could use the certificate during a man-in-the-middle\nattack and potentially confuse Firefox into accepting it by mistake.\n(CVE-2009-2408)\n\nDan Kaminsky found that browsers still accept certificates with MD2 hash\nsignatures, even though MD2 is no longer considered a cryptographically\nstrong algorithm. This could make it easier for an attacker to create a\nmalicious certificate that would be treated as trusted by a browser. NSS\nnow disables the use of MD2 and MD4 algorithms inside signatures by\ndefault. (CVE-2009-2409)\n\nAll users of nspr and nss are advised to upgrade to these updated packages,\nwhich resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1207",
"url": "https://access.redhat.com/errata/RHSA-2009:1207"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "512912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1207.json"
}
],
"title": "Red Hat Security Advisory: nspr and nss security update",
"tracking": {
"current_release_date": "2026-01-28T22:51:03+00:00",
"generator": {
"date": "2026-01-28T22:51:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2009:1207",
"initial_release_date": "2009-08-12T14:31:00+00:00",
"revision_history": [
{
"date": "2009-08-12T14:31:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-12T10:31:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:51:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_2.ia64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_2.ia64",
"product_id": "nss-0:3.12.3.99.3-1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_2.ia64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_2.ia64",
"product_id": "nspr-devel-0:4.7.4-1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_2.ia64",
"product": {
"name": "nspr-0:4.7.4-1.el5_2.ia64",
"product_id": "nspr-0:4.7.4-1.el5_2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_2.i386",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_2.i386",
"product_id": "nss-0:3.12.3.99.3-1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_2.i386",
"product": {
"name": "nspr-0:4.7.4-1.el5_2.i386",
"product_id": "nspr-0:4.7.4-1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_2.i386",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_2.i386",
"product_id": "nspr-devel-0:4.7.4-1.el5_2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_2.ppc64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_2.ppc64",
"product_id": "nss-0:3.12.3.99.3-1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_2.ppc64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_2.ppc64",
"product_id": "nspr-devel-0:4.7.4-1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_2.ppc64",
"product": {
"name": "nspr-0:4.7.4-1.el5_2.ppc64",
"product_id": "nspr-0:4.7.4-1.el5_2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_2.ppc",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_2.ppc",
"product_id": "nss-0:3.12.3.99.3-1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_2.ppc",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_2.ppc",
"product_id": "nspr-devel-0:4.7.4-1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_2.ppc",
"product": {
"name": "nspr-0:4.7.4-1.el5_2.ppc",
"product_id": "nspr-0:4.7.4-1.el5_2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_2.src",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_2.src",
"product_id": "nss-0:3.12.3.99.3-1.el5_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_2.src",
"product": {
"name": "nspr-0:4.7.4-1.el5_2.src",
"product_id": "nspr-0:4.7.4-1.el5_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_2.s390x",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_2.s390x",
"product_id": "nss-0:3.12.3.99.3-1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_2.s390x",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_2.s390x",
"product_id": "nspr-devel-0:4.7.4-1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_2.s390x",
"product": {
"name": "nspr-0:4.7.4-1.el5_2.s390x",
"product_id": "nspr-0:4.7.4-1.el5_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_2.s390",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_2.s390",
"product_id": "nss-0:3.12.3.99.3-1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_2.s390",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_2.s390",
"product_id": "nspr-devel-0:4.7.4-1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_2.s390",
"product": {
"name": "nspr-0:4.7.4-1.el5_2.s390",
"product_id": "nspr-0:4.7.4-1.el5_2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el5_2.x86_64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el5_2.x86_64",
"product_id": "nss-0:3.12.3.99.3-1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el5_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.x86_64",
"product": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.x86_64",
"product_id": "nss-tools-0:3.12.3.99.3-1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.3.99.3-1.el5_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el5_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el5_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"product_id": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.3.99.3-1.el5_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el5_2.x86_64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el5_2.x86_64",
"product_id": "nspr-devel-0:4.7.4-1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el5_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el5_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el5_2.x86_64",
"product": {
"name": "nspr-0:4.7.4-1.el5_2.x86_64",
"product_id": "nspr-0:4.7.4-1.el5_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el5_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386"
},
"product_reference": "nspr-0:4.7.4-1.el5_2.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el5_2.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el5_2.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_2.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el5_2.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_2.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390"
},
"product_reference": "nspr-0:4.7.4-1.el5_2.s390",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el5_2.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_2.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src"
},
"product_reference": "nspr-0:4.7.4-1.el5_2.src",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el5_2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el5_2.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el5_2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_2.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_2.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_2.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_2.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_2.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_2.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_2.s390",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_2.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el5_2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el5_2.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_2.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_2.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_2.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_2.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_2.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_2.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_2.s390",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_2.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_2.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_2.src",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el5_2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el5_2.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el5_2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"relates_to_product_reference": "5Server-5.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.3.99.3-1.el5_2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
"product_id": "5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
},
"product_reference": "nss-tools-0:3.12.3.99.3-1.el5_2.x86_64",
"relates_to_product_reference": "5Server-5.2.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2404",
"discovery_date": "2009-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512912"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss regexp heap overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2404"
},
{
"category": "external",
"summary": "RHBZ#512912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2404"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-12T14:31:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1207"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "nss regexp heap overflow"
},
{
"cve": "CVE-2009-2408",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510251"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "firefox/nss: doesn\u0027t handle NULL in Common Name properly",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2408"
},
{
"category": "external",
"summary": "RHBZ#510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-12T14:31:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1207"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "firefox/nss: doesn\u0027t handle NULL in Common Name properly"
},
{
"cve": "CVE-2009-2409",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510197"
}
],
"notes": [
{
"category": "description",
"text": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "deprecate MD2 in SSL cert validation (Kaminsky)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2409"
},
{
"category": "external",
"summary": "RHBZ#510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-12T14:31:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1207"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.src",
"5Server-5.2.Z:nspr-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-debuginfo-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.i386",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ia64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.ppc64",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.s390x",
"5Server-5.2.Z:nspr-devel-0:4.7.4-1.el5_2.x86_64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.src",
"5Server-5.2.Z:nss-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-debuginfo-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.ppc64",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-pkcs11-devel-0:3.12.3.99.3-1.el5_2.x86_64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.i386",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ia64",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.ppc",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.s390x",
"5Server-5.2.Z:nss-tools-0:3.12.3.99.3-1.el5_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "deprecate MD2 in SSL cert validation (Kaminsky)"
}
]
}
RHSA-2009:1190
Vulnerability from csaf_redhat - Published: 2009-07-31 14:26 - Updated: 2026-01-28 22:51Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated nspr and nss packages that fix security issues and bugs are now\navailable for Red Hat Enterprise Linux 4.7 Extended Update Support.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Netscape Portable Runtime (NSPR) provides platform independence for non-GUI\noperating system facilities. These facilities include threads, thread\nsynchronization, normal file and network I/O, interval timing, calendar\ntime, basic memory management (malloc and free), and shared library linking.\n\nNetwork Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications. Applications built with NSS can support SSLv2, SSLv3, TLS,\nand other security standards.\n\nThese updated packages upgrade NSS from the previous version, 3.12.2, to a\nprerelease of version 3.12.4. The version of NSPR has also been upgraded\nfrom 4.7.3 to 4.7.4.\n\nMoxie Marlinspike reported a heap overflow flaw in a regular expression\nparser in the NSS library used by browsers such as Mozilla Firefox to match\ncommon names in certificates. A malicious website could present a\ncarefully-crafted certificate in such a way as to trigger the heap\noverflow, leading to a crash or, possibly, arbitrary code execution with\nthe permissions of the user running the browser. (CVE-2009-2404)\n\nNote: in order to exploit this issue without further user interaction in\nFirefox, the carefully-crafted certificate would need to be signed by a\nCertificate Authority trusted by Firefox, otherwise Firefox presents the\nvictim with a warning that the certificate is untrusted. Only if the user\nthen accepts the certificate will the overflow take place.\n\nDan Kaminsky discovered flaws in the way browsers such as Firefox handle\nNULL characters in a certificate. If an attacker is able to get a\ncarefully-crafted certificate signed by a Certificate Authority trusted by\nFirefox, the attacker could use the certificate during a man-in-the-middle\nattack and potentially confuse Firefox into accepting it by mistake.\n(CVE-2009-2408)\n\nDan Kaminsky found that browsers still accept certificates with MD2 hash\nsignatures, even though MD2 is no longer considered a cryptographically\nstrong algorithm. This could make it easier for an attacker to create a\nmalicious certificate that would be treated as trusted by a browser. NSS\nnow disables the use of MD2 and MD4 algorithms inside signatures by\ndefault. (CVE-2009-2409)\n\nThese version upgrades also provide fixes for the following bugs:\n\n* SSL client authentication failed against an Apache server when it was \nusing the mod_nss module and configured for NSSOCSP. On the client side,\nthe user agent received an error message that referenced \"Error Code:\n-12271\" and stated that establishing an encrypted connection had failed\nbecause the certificate had been rejected by the host.\n\nOn the server side, the nss_error_log under /var/log/httpd/ contained the\nfollowing message:\n\n[error] Re-negotiation handshake failed: Not accepted by client!?\n\nAlso, /var/log/httpd/error_log contained this error:\n\nSSL Library Error: -8071 The OCSP server experienced an internal error\n\nWith these updated packages, the dependency problem which caused this\nfailure has been resolved so that SSL client authentication with an\nApache web server using mod_nss which is configured for NSSOCSP succeeds\nas expected. Note that if the presented client certificate is expired,\nthen access is denied, the user agent is presented with an error message\nabout the invalid certificate, and the OCSP queries are seen in the OCSP\nresponder. Also, similar OCSP status verification happens for SSL server\ncertificates used in Apache upon instance start or restart. (BZ#508026)\n\n* NSS uses a software integrity test to detect code corruption. RPM\ntransactions and system link optimization daemons (such as prelink) can\nchange the contents of libraries, causing the software integrity test to\nfail. In combination with the updated prelink package (RHBA-2009:1041),\nthese updated packages can now prevent software integrity test failures.\n(BZ#495938)\n\nAll users of nspr and nss are advised to upgrade to these updated packages,\nwhich resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1190",
"url": "https://access.redhat.com/errata/RHSA-2009:1190"
},
{
"category": "external",
"summary": "495938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=495938"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "512912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"category": "external",
"summary": "508026",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508026"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1190.json"
}
],
"title": "Red Hat Security Advisory: nspr and nss security and bug fix update",
"tracking": {
"current_release_date": "2026-01-28T22:51:02+00:00",
"generator": {
"date": "2026-01-28T22:51:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2009:1190",
"initial_release_date": "2009-07-31T14:26:00+00:00",
"revision_history": [
{
"date": "2009-07-31T14:26:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-31T10:31:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:51:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product": {
"name": "Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.7::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product": {
"name": "Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:4.7::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"product_id": "nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_7.1.ia64",
"product": {
"name": "nspr-0:4.7.4-1.el4_7.1.ia64",
"product_id": "nspr-0:4.7.4-1.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"product_id": "nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_7.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_7.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_7.6?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_7.1.i386",
"product": {
"name": "nspr-0:4.7.4-1.el4_7.1.i386",
"product_id": "nspr-0:4.7.4-1.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_7.1.i386",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.i386",
"product_id": "nspr-devel-0:4.7.4-1.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_7.6.i386",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.i386",
"product_id": "nss-0:3.12.3.99.3-1.el4_7.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_7.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_7.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_7.6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"product_id": "nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_7.1.x86_64",
"product": {
"name": "nspr-0:4.7.4-1.el4_7.1.x86_64",
"product_id": "nspr-0:4.7.4-1.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product_id": "nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_7.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_7.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_7.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_7.1.src",
"product": {
"name": "nspr-0:4.7.4-1.el4_7.1.src",
"product_id": "nspr-0:4.7.4-1.el4_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_7.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_7.6.src",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.src",
"product_id": "nss-0:3.12.3.99.3-1.el4_7.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_7.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"product_id": "nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_7.1.ppc",
"product": {
"name": "nspr-0:4.7.4-1.el4_7.1.ppc",
"product_id": "nspr-0:4.7.4-1.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"product_id": "nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_7.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_7.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_7.6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_7.1.ppc64",
"product": {
"name": "nspr-0:4.7.4-1.el4_7.1.ppc64",
"product_id": "nspr-0:4.7.4-1.el4_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"product_id": "nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_7.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_7.6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"product_id": "nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_7.1.s390x",
"product": {
"name": "nspr-0:4.7.4-1.el4_7.1.s390x",
"product_id": "nspr-0:4.7.4-1.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"product_id": "nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_7.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_7.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_7.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"product": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"product_id": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-debuginfo@4.7.4-1.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-0:4.7.4-1.el4_7.1.s390",
"product": {
"name": "nspr-0:4.7.4-1.el4_7.1.s390",
"product_id": "nspr-0:4.7.4-1.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr@4.7.4-1.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nspr-devel-0:4.7.4-1.el4_7.1.s390",
"product": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.s390",
"product_id": "nspr-devel-0:4.7.4-1.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nspr-devel@4.7.4-1.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.3.99.3-1.el4_7.6.s390",
"product": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.s390",
"product_id": "nss-0:3.12.3.99.3-1.el4_7.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.3.99.3-1.el4_7.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"product": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"product_id": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.3.99.3-1.el4_7.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"product": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"product_id": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.3.99.3-1.el4_7.6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.i386",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.ppc",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.src",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.i386",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.i386",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.src",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)",
"product_id": "4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"relates_to_product_reference": "4AS-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.i386",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.ppc",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.src",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-0:4.7.4-1.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64"
},
"product_reference": "nspr-0:4.7.4-1.el4_7.1.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64"
},
"product_reference": "nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.i386",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nspr-devel-0:4.7.4-1.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64"
},
"product_reference": "nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.i386",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.src",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.3.99.3-1.el4_7.6.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64"
},
"product_reference": "nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"relates_to_product_reference": "4ES-4.7.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)",
"product_id": "4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
},
"product_reference": "nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"relates_to_product_reference": "4ES-4.7.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-2404",
"discovery_date": "2009-07-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512912"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss regexp heap overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2404"
},
{
"category": "external",
"summary": "RHBZ#512912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2404"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-31T14:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1190"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "nss regexp heap overflow"
},
{
"cve": "CVE-2009-2408",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510251"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "firefox/nss: doesn\u0027t handle NULL in Common Name properly",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2408"
},
{
"category": "external",
"summary": "RHBZ#510251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-31T14:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1190"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "firefox/nss: doesn\u0027t handle NULL in Common Name properly"
},
{
"cve": "CVE-2009-2409",
"discovery_date": "2009-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510197"
}
],
"notes": [
{
"category": "description",
"text": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "deprecate MD2 in SSL cert validation (Kaminsky)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2409"
},
{
"category": "external",
"summary": "RHBZ#510197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409"
}
],
"release_date": "2009-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-31T14:26:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1190"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4AS-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4AS-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4AS-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4AS-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.src",
"4ES-4.7.z:nspr-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.ppc64",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-debuginfo-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.i386",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ia64",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.ppc",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.s390x",
"4ES-4.7.z:nspr-devel-0:4.7.4-1.el4_7.1.x86_64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.src",
"4ES-4.7.z:nss-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.ppc64",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-debuginfo-0:3.12.3.99.3-1.el4_7.6.x86_64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.i386",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ia64",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.ppc",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.s390x",
"4ES-4.7.z:nss-devel-0:3.12.3.99.3-1.el4_7.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "deprecate MD2 in SSL cert validation (Kaminsky)"
}
]
}
GHSA-PM7C-VG9H-JXXC
Vulnerability from github – Published: 2022-05-02 03:35 – Updated: 2024-02-14 18:30Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
{
"affected": [],
"aliases": [
"CVE-2009-2408"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-295"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-07-30T19:30:00Z",
"severity": "MODERATE"
},
"details": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.",
"id": "GHSA-pm7c-vg9h-jxxc",
"modified": "2024-02-14T18:30:24Z",
"published": "2022-05-02T03:35:01Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2408"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/810-2"
},
{
"type": "WEB",
"url": "http://isc.sans.org/diary.html?storyid=7003"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
},
{
"type": "WEB",
"url": "http://osvdb.org/56723"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36088"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36125"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36139"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36157"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36434"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36669"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37098"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1874"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:217"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
},
{
"type": "WEB",
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1022632"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-810-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/2085"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"type": "WEB",
"url": "http://www.wired.com/threatlevel/2009/07/kaminsky"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2009-2408
Vulnerability from fkie_nvd - Published: 2009-07-30 19:30 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://isc.sans.org/diary.html?storyid=7003 | Broken Link | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html | Mailing List | |
| secalert@redhat.com | http://marc.info/?l=oss-security&m=125198917018936&w=2 | Mailing List | |
| secalert@redhat.com | http://osvdb.org/56723 | Broken Link | |
| secalert@redhat.com | http://secunia.com/advisories/36088 | Broken Link, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/36125 | Broken Link, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/36139 | Broken Link, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/36157 | Broken Link, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/36434 | Broken Link, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/36669 | Broken Link | |
| secalert@redhat.com | http://secunia.com/advisories/37098 | Broken Link | |
| secalert@redhat.com | http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1 | Broken Link | |
| secalert@redhat.com | http://www.debian.org/security/2009/dsa-1874 | Mailing List | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2009:197 | Broken Link | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2009:216 | Broken Link | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2009:217 | Broken Link | |
| secalert@redhat.com | http://www.mozilla.org/security/announce/2009/mfsa2009-42.html | Vendor Advisory | |
| secalert@redhat.com | http://www.novell.com/linux/security/advisories/2009_48_firefox.html | Broken Link | |
| secalert@redhat.com | http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8&r2=1.11&f=h | Broken Link | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1207.html | Broken Link | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1432.html | Broken Link | |
| secalert@redhat.com | http://www.securitytracker.com/id?1022632 | Broken Link, Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-810-1 | Third Party Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/2085 | Broken Link, Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/3184 | Broken Link | |
| secalert@redhat.com | http://www.wired.com/threatlevel/2009/07/kaminsky/ | Press/Media Coverage | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=510251 | Issue Tracking | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751 | Broken Link | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458 | Broken Link | |
| secalert@redhat.com | https://usn.ubuntu.com/810-2/ | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://isc.sans.org/diary.html?storyid=7003 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=125198917018936&w=2 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/56723 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36088 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36125 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36139 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36157 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36434 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36669 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37098 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1874 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:197 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:216 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:217 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mozilla.org/security/announce/2009/mfsa2009-42.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2009_48_firefox.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8&r2=1.11&f=h | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1207.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1432.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022632 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-810-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/2085 | Broken Link, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3184 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.wired.com/threatlevel/2009/07/kaminsky/ | Press/Media Coverage | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=510251 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/810-2/ | Broken Link |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | network_security_services | * | |
| mozilla | seamonkey | * | |
| mozilla | thunderbird | * | |
| opensuse | opensuse | * | |
| suse | linux_enterprise | 10.0 | |
| suse | linux_enterprise | 11.0 | |
| suse | linux_enterprise_server | 9 | |
| debian | debian_linux | 5.0 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 8.10 | |
| canonical | ubuntu_linux | 9.04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "311A4763-8018-4394-946D-C75220572EA5",
"versionEndExcluding": "3.0.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A21F310D-7D9F-45D7-974D-C615F99FBEB8",
"versionEndExcluding": "3.12.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"matchCriteriaId": "336E3C0C-0197-40FD-AD68-C13C518858C8",
"versionEndExcluding": "1.1.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C213A6FE-549A-4B85-BCBE-11CAF63A376C",
"versionEndExcluding": "2.0.0.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF141FBE-4CA5-4695-94A0-8BE1309D28CC",
"versionEndIncluding": "11.1",
"versionStartIncluding": "10.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
"matchCriteriaId": "AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*",
"matchCriteriaId": "1608E282-2E96-4447-848D-DBE915DB0EF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD2D897-E321-4CED-92E0-11A98B52053C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5."
},
{
"lang": "es",
"value": "Mozilla Firefox anterior a v3.5 y NSS anterior a v3.12.3 no tratan apropiadamente un car\u00e1cter \u0027\\0\u0027 en un nombre de dominio en el campo nombre com\u00fan (CN) del asunto de un certificado X.509, que permite a un atacante de hombre-en-el-medio suplantar servidores SSL arbitrarios a trav\u00e9s de un certificado manipulado por una autoridad de certificaci\u00f3n."
}
],
"id": "CVE-2009-2408",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2009-07-30T19:30:00.313",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://isc.sans.org/diary.html?storyid=7003"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/56723"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36088"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36125"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36139"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36157"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36434"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/36669"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/37098"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "http://www.debian.org/security/2009/dsa-1874"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:217"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1022632"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-810-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2085"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"source": "secalert@redhat.com",
"tags": [
"Press/Media Coverage"
],
"url": "http://www.wired.com/threatlevel/2009/07/kaminsky/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://usn.ubuntu.com/810-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://isc.sans.org/diary.html?storyid=7003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/56723"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36088"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36157"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36434"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/36669"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/37098"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.debian.org/security/2009/dsa-1874"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:217"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1022632"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-810-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2085"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Press/Media Coverage"
],
"url": "http://www.wired.com/threatlevel/2009/07/kaminsky/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://usn.ubuntu.com/810-2/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2009-2408
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-2408",
"description": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.",
"id": "GSD-2009-2408",
"references": [
"https://www.suse.com/security/cve/CVE-2009-2408.html",
"https://www.debian.org/security/2010/dsa-2025",
"https://www.debian.org/security/2009/dsa-1874",
"https://access.redhat.com/errata/RHSA-2009:1432",
"https://access.redhat.com/errata/RHSA-2009:1207",
"https://access.redhat.com/errata/RHSA-2009:1190",
"https://access.redhat.com/errata/RHSA-2009:1186",
"https://access.redhat.com/errata/RHSA-2009:1184",
"https://linux.oracle.com/cve/CVE-2009-2408.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-2408"
],
"details": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.",
"id": "GSD-2009-2408",
"modified": "2023-12-13T01:19:46.579668Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-2408",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/advisories/37098",
"refsource": "MISC",
"url": "http://secunia.com/advisories/37098"
},
{
"name": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html",
"refsource": "MISC",
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html"
},
{
"name": "http://www.vupen.com/english/advisories/2009/3184",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "http://secunia.com/advisories/36088",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36088"
},
{
"name": "http://secunia.com/advisories/36125",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36125"
},
{
"name": "http://secunia.com/advisories/36139",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36139"
},
{
"name": "http://secunia.com/advisories/36157",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36157"
},
{
"name": "http://secunia.com/advisories/36434",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36434"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1",
"refsource": "MISC",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1"
},
{
"name": "http://www.debian.org/security/2009/dsa-1874",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1874"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-1207.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
},
{
"name": "http://www.ubuntu.com/usn/usn-810-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-810-1"
},
{
"name": "http://www.vupen.com/english/advisories/2009/2085",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/2085"
},
{
"name": "https://usn.ubuntu.com/810-2/",
"refsource": "MISC",
"url": "https://usn.ubuntu.com/810-2/"
},
{
"name": "http://isc.sans.org/diary.html?storyid=7003",
"refsource": "MISC",
"url": "http://isc.sans.org/diary.html?storyid=7003"
},
{
"name": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
},
{
"name": "http://osvdb.org/56723",
"refsource": "MISC",
"url": "http://osvdb.org/56723"
},
{
"name": "http://secunia.com/advisories/36669",
"refsource": "MISC",
"url": "http://secunia.com/advisories/36669"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:217",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:217"
},
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html",
"refsource": "MISC",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"name": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h",
"refsource": "MISC",
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-1432.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
},
{
"name": "http://www.securitytracker.com/id?1022632",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1022632"
},
{
"name": "http://www.wired.com/threatlevel/2009/07/kaminsky/",
"refsource": "MISC",
"url": "http://www.wired.com/threatlevel/2009/07/kaminsky/"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=510251",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "311A4763-8018-4394-946D-C75220572EA5",
"versionEndExcluding": "3.0.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A21F310D-7D9F-45D7-974D-C615F99FBEB8",
"versionEndExcluding": "3.12.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"matchCriteriaId": "336E3C0C-0197-40FD-AD68-C13C518858C8",
"versionEndExcluding": "1.1.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C213A6FE-549A-4B85-BCBE-11CAF63A376C",
"versionEndExcluding": "2.0.0.23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF141FBE-4CA5-4695-94A0-8BE1309D28CC",
"versionEndIncluding": "11.1",
"versionStartIncluding": "10.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
"matchCriteriaId": "AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*",
"matchCriteriaId": "1608E282-2E96-4447-848D-DBE915DB0EF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD2D897-E321-4CED-92E0-11A98B52053C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5."
},
{
"lang": "es",
"value": "Mozilla Firefox anterior a v3.5 y NSS anterior a v3.12.3 no tratan apropiadamente un car\u00e1cter \u0027\\0\u0027 en un nombre de dominio en el campo nombre com\u00fan (CN) del asunto de un certificado X.509, que permite a un atacante de hombre-en-el-medio suplantar servidores SSL arbitrarios a trav\u00e9s de un certificado manipulado por una autoridad de certificaci\u00f3n."
}
],
"id": "CVE-2009-2408",
"lastModified": "2024-02-14T17:21:52.867",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2009-07-30T19:30:00.313",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://isc.sans.org/diary.html?storyid=7003"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/56723"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36088"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36125"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36139"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36157"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36434"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/36669"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/37098"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "http://www.debian.org/security/2009/dsa-1874"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:197"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:216"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:217"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1207.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1432.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1022632"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-810-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/2085"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"source": "secalert@redhat.com",
"tags": [
"Press/Media Coverage"
],
"url": "http://www.wired.com/threatlevel/2009/07/kaminsky/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10751"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8458"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://usn.ubuntu.com/810-2/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
VAR-200907-0748
Vulnerability from variot - Updated: 2026-03-09 22:49Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5. There is a mismatch between the NSS library's handling of the domain name in the SSL certificate between the SSL client and the CA that issued the server certificate. If a malicious user requests a certificate from a hostname with an invalid null character, most CAs will issue a certificate as long as the requester has the domain specified after the null character, but most SSL clients (browsers) will ignore this part of the name, Using a null character before the portion of validation allows an attacker to use a fake certificate in a man-in-the-middle attack to establish a false trust relationship.
A vulnerability was found in xmltok_impl.c (expat) that with specially crafted XML could be exploited and lead to a denial of service attack. Related to CVE-2009-2625 (CVE-2009-3720).
This update provides the latest version of Thunderbird which are not vulnerable to these issues.
Update:
Packages for 2008.0 are being provided due to extended support for Corporate products.
An input sanitization flaw was found in the KSSL (KDE SSL Wrapper) API. An attacker could supply a specially-crafted SSL certificate (for example, via a web page) to an application using KSSL, such as the Konqueror web browser, causing misleading information to be presented to the user, possibly tricking them into accepting the certificate as valid (CVE-2011-3365).
The updated packages have been patched to correct these issues.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2702 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3365
Updated Packages:
Mandriva Linux 2010.1: 8c6545c176b2716248c33e52135a3e2d 2010.1/i586/kdelibs4-core-4.4.5-0.4mdv2010.2.i586.rpm e54c7a21386ff85f46471fda6135ff6c 2010.1/i586/kdelibs4-devel-4.4.5-0.4mdv2010.2.i586.rpm 243c4d3db4a9e95a393f97e74818488e 2010.1/i586/libkde3support4-4.4.5-0.4mdv2010.2.i586.rpm 2b62c63d46a66adf26667731ddca4a06 2010.1/i586/libkdecore5-4.4.5-0.4mdv2010.2.i586.rpm 025038d3783371e8f46d11eaf204e65f 2010.1/i586/libkdefakes5-4.4.5-0.4mdv2010.2.i586.rpm 9a3bfa3d242e1d45194c4f55f812c67d 2010.1/i586/libkdesu5-4.4.5-0.4mdv2010.2.i586.rpm e9c69b97be0d6c7adcf7233c1d590dc6 2010.1/i586/libkdeui5-4.4.5-0.4mdv2010.2.i586.rpm 1ecfc8e228818bf267979da7428ba24a 2010.1/i586/libkdewebkit5-4.4.5-0.4mdv2010.2.i586.rpm 2be64f84a3a0160d353eaf4a66c88b1c 2010.1/i586/libkdnssd4-4.4.5-0.4mdv2010.2.i586.rpm 44fc6a0928497b64217bc06637ecc219 2010.1/i586/libkfile4-4.4.5-0.4mdv2010.2.i586.rpm e148b42fa8180b02aa3c7c54089cd16e 2010.1/i586/libkhtml5-4.4.5-0.4mdv2010.2.i586.rpm c17229d3aff113fee855eb647b2ee891 2010.1/i586/libkimproxy4-4.4.5-0.4mdv2010.2.i586.rpm 19876055e3b367010fd3a156a86a36ad 2010.1/i586/libkio5-4.4.5-0.4mdv2010.2.i586.rpm 5090009d080971d3ab92f788f18f1e26 2010.1/i586/libkjs4-4.4.5-0.4mdv2010.2.i586.rpm 8c2065a0cb35e2cc182b6bd0db267d62 2010.1/i586/libkjsapi4-4.4.5-0.4mdv2010.2.i586.rpm ed3966642b6a5d54ecffb6fc9a8b6290 2010.1/i586/libkjsembed4-4.4.5-0.4mdv2010.2.i586.rpm 008fe65285eaf4ba2d9f7c0655230c52 2010.1/i586/libkmediaplayer4-4.4.5-0.4mdv2010.2.i586.rpm 001fbc71b4da46f199b505c58e0c6228 2010.1/i586/libknewstuff2_4-4.4.5-0.4mdv2010.2.i586.rpm 672553fad8848265e1ba408f43bf7781 2010.1/i586/libknewstuff34-4.4.5-0.4mdv2010.2.i586.rpm 13cf045179be91975700fa3310a0fc70 2010.1/i586/libknotifyconfig4-4.4.5-0.4mdv2010.2.i586.rpm 3752242079665a17a3a35ac4c05484bd 2010.1/i586/libkntlm4-4.4.5-0.4mdv2010.2.i586.rpm af471317415306fdfbb5ff9d3c49ceea 2010.1/i586/libkparts4-4.4.5-0.4mdv2010.2.i586.rpm 8d3c2e7c7ba723e56bc090786d1bf96c 2010.1/i586/libkpty4-4.4.5-0.4mdv2010.2.i586.rpm b5648f3780cdc55c57a0d03d3fb7cc97 2010.1/i586/libkrosscore4-4.4.5-0.4mdv2010.2.i586.rpm ea771f370b730efa9c4019c8ceac1c22 2010.1/i586/libkrossui4-4.4.5-0.4mdv2010.2.i586.rpm 44dc92b4ff070db13c9dfb4954dcfa75 2010.1/i586/libktexteditor4-4.4.5-0.4mdv2010.2.i586.rpm 926b45cc828f8f53d63a6030d278e5bd 2010.1/i586/libkunitconversion4-4.4.5-0.4mdv2010.2.i586.rpm 4fd1c96ffa938806a5d055a4b61c3845 2010.1/i586/libkunittest4-4.4.5-0.4mdv2010.2.i586.rpm 99a712d56d383e91b17ac560a109d9ce 2010.1/i586/libkutils4-4.4.5-0.4mdv2010.2.i586.rpm 5db891d08fcfbe866da4a2cfc2c101ed 2010.1/i586/libnepomuk4-4.4.5-0.4mdv2010.2.i586.rpm 853dc3a02d9783bc7d4ed5586271f82a 2010.1/i586/libnepomukquery4-4.4.5-0.4mdv2010.2.i586.rpm 0b4d63fd1d8edd42a74ae1832694ef84 2010.1/i586/libplasma3-4.4.5-0.4mdv2010.2.i586.rpm fb356f0eb954f2871f0bd91ef4981f74 2010.1/i586/libsolid4-4.4.5-0.4mdv2010.2.i586.rpm ee166bc5ab6785306f330e4e13b59938 2010.1/i586/libthreadweaver4-4.4.5-0.4mdv2010.2.i586.rpm a3bd1963ad774911ef4d1902ce33aec9 2010.1/SRPMS/kdelibs4-4.4.5-0.4mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64: e4f1f7f8407938fae5eee9be6daf6463 2010.1/x86_64/kdelibs4-core-4.4.5-0.4mdv2010.2.x86_64.rpm afc1815bfb3e5c1b17a5e774a86d8262 2010.1/x86_64/kdelibs4-devel-4.4.5-0.4mdv2010.2.x86_64.rpm acabd29c100952c3a8268f6e48ae729c 2010.1/x86_64/lib64kde3support4-4.4.5-0.4mdv2010.2.x86_64.rpm 4496e00fc526e1b331d5f7553ad759ab 2010.1/x86_64/lib64kdecore5-4.4.5-0.4mdv2010.2.x86_64.rpm 9f6dfb1b7af9299fb96941926e7d69e9 2010.1/x86_64/lib64kdefakes5-4.4.5-0.4mdv2010.2.x86_64.rpm 2e682ce762d8a60cc4322370567b5f6c 2010.1/x86_64/lib64kdesu5-4.4.5-0.4mdv2010.2.x86_64.rpm acd07b647db525427550f6763b936a7a 2010.1/x86_64/lib64kdeui5-4.4.5-0.4mdv2010.2.x86_64.rpm 4fb64c5e05fb52b0b2c5eb1a92fdb3d1 2010.1/x86_64/lib64kdewebkit5-4.4.5-0.4mdv2010.2.x86_64.rpm 4176fd87a0b92f2ee7d088f3d4a774d0 2010.1/x86_64/lib64kdnssd4-4.4.5-0.4mdv2010.2.x86_64.rpm eed83cf3b32bd23a0b16fce8d2834e9d 2010.1/x86_64/lib64kfile4-4.4.5-0.4mdv2010.2.x86_64.rpm d66febf0bb7e273fb687c144a36ac138 2010.1/x86_64/lib64khtml5-4.4.5-0.4mdv2010.2.x86_64.rpm 174ac58c7dc86ee4458526b5a2480662 2010.1/x86_64/lib64kimproxy4-4.4.5-0.4mdv2010.2.x86_64.rpm b7c162555f547ae0d9edbf71bfe04f0d 2010.1/x86_64/lib64kio5-4.4.5-0.4mdv2010.2.x86_64.rpm 5d89a4e23e342dee305e2107bfdc8c0e 2010.1/x86_64/lib64kjs4-4.4.5-0.4mdv2010.2.x86_64.rpm d2df6f4275de4ff6407188ada2785094 2010.1/x86_64/lib64kjsapi4-4.4.5-0.4mdv2010.2.x86_64.rpm 50ed7da9bcd068acb4819139eebb9026 2010.1/x86_64/lib64kjsembed4-4.4.5-0.4mdv2010.2.x86_64.rpm ad3c77de9a052f9b2612b15fb82be03f 2010.1/x86_64/lib64kmediaplayer4-4.4.5-0.4mdv2010.2.x86_64.rpm b9a8fbcdc54c359415075cf449ef6e4f 2010.1/x86_64/lib64knewstuff2_4-4.4.5-0.4mdv2010.2.x86_64.rpm 6d6c9151d9a634ca423770e919179b50 2010.1/x86_64/lib64knewstuff34-4.4.5-0.4mdv2010.2.x86_64.rpm fe7c248a30318f755bd0fe1b11f98fe4 2010.1/x86_64/lib64knotifyconfig4-4.4.5-0.4mdv2010.2.x86_64.rpm 888e7081a5be8ac0e1cbd7b47fd13ae7 2010.1/x86_64/lib64kntlm4-4.4.5-0.4mdv2010.2.x86_64.rpm 5c5e89cc9cd02ebf9267b7ee5faf1278 2010.1/x86_64/lib64kparts4-4.4.5-0.4mdv2010.2.x86_64.rpm 6c6bb95f61e8c26cc50902024303b3fe 2010.1/x86_64/lib64kpty4-4.4.5-0.4mdv2010.2.x86_64.rpm 22d1c3f2d8345743f1d834ecccd069d4 2010.1/x86_64/lib64krosscore4-4.4.5-0.4mdv2010.2.x86_64.rpm 502fb43a0a37496f2c11616d07fbbcbe 2010.1/x86_64/lib64krossui4-4.4.5-0.4mdv2010.2.x86_64.rpm d4fbf824ea3c54a902dc1e18e13756d0 2010.1/x86_64/lib64ktexteditor4-4.4.5-0.4mdv2010.2.x86_64.rpm 927ed8af9b7e7c575c9e7984f4e80a89 2010.1/x86_64/lib64kunitconversion4-4.4.5-0.4mdv2010.2.x86_64.rpm 12cd248453e3a3791de5f87f988eb430 2010.1/x86_64/lib64kunittest4-4.4.5-0.4mdv2010.2.x86_64.rpm 2f9420a8dadfb08821bd911a3adb7b3f 2010.1/x86_64/lib64kutils4-4.4.5-0.4mdv2010.2.x86_64.rpm b9c9f1d4e0c8a51fd5d081b05b362def 2010.1/x86_64/lib64nepomuk4-4.4.5-0.4mdv2010.2.x86_64.rpm e80871c0e9b5b0c72a3ea2b2f86e64d1 2010.1/x86_64/lib64nepomukquery4-4.4.5-0.4mdv2010.2.x86_64.rpm 29b23d3b31f4db91dc73f6a37ea02db1 2010.1/x86_64/lib64plasma3-4.4.5-0.4mdv2010.2.x86_64.rpm c2ba7f9a9f2202330a1c7bf46004f41d 2010.1/x86_64/lib64solid4-4.4.5-0.4mdv2010.2.x86_64.rpm 8a0ec353667253b3e3899c6980052999 2010.1/x86_64/lib64threadweaver4-4.4.5-0.4mdv2010.2.x86_64.rpm a3bd1963ad774911ef4d1902ce33aec9 2010.1/SRPMS/kdelibs4-4.4.5-0.4mdv2010.2.src.rpm
Mandriva Linux 2011: 44421dc86e6c96eb9f4a1b835c40006d 2011/i586/kdelibs4-core-4.6.5-9.1-mdv2011.0.i586.rpm 31ef78219ce113dc91ba2d45ca166276 2011/i586/kdelibs4-devel-4.6.5-9.1-mdv2011.0.i586.rpm c72c7b24079aab97ce0923f5dd0bdf24 2011/i586/libkatepartinterfaces4-4.6.5-9.1-mdv2011.0.i586.rpm 882b577dc3c6a9b9f1c7872046cbffb4 2011/i586/libkcmutils4-4.6.5-9.1-mdv2011.0.i586.rpm b1cdc2769a17e075b43a2d1e49eb4efb 2011/i586/libkde3support4-4.6.5-9.1-mdv2011.0.i586.rpm 2aa0a579e90ea8b0015bcbccdeb4077e 2011/i586/libkdecore5-4.6.5-9.1-mdv2011.0.i586.rpm 105f203a2470d8d3aaf4381ba47f4a20 2011/i586/libkdefakes5-4.6.5-9.1-mdv2011.0.i586.rpm 3ad287cab02d774df12b8f5cedd2b7cb 2011/i586/libkdesu5-4.6.5-9.1-mdv2011.0.i586.rpm 4d4dcdf956ca0194bc2da5d901e14910 2011/i586/libkdeui5-4.6.5-9.1-mdv2011.0.i586.rpm c5d8b2ced514be22ff42c8a610dea367 2011/i586/libkdewebkit5-4.6.5-9.1-mdv2011.0.i586.rpm 89d3df52d5659ba172b5021aaa0800ba 2011/i586/libkdnssd4-4.6.5-9.1-mdv2011.0.i586.rpm 6f6e7b50cc22c4d0efec46ad85c52145 2011/i586/libkemoticons4-4.6.5-9.1-mdv2011.0.i586.rpm f9e7fb1a985fee36db209259643e3d43 2011/i586/libkfile4-4.6.5-9.1-mdv2011.0.i586.rpm ce0c07b3ab9ffb23074e3dcfd311251f 2011/i586/libkhtml5-4.6.5-9.1-mdv2011.0.i586.rpm 3e4bcd7edf1e6ddb2d2a75a563e83362 2011/i586/libkidletime4-4.6.5-9.1-mdv2011.0.i586.rpm bc4ad21bf5df0428897249edc07ee139 2011/i586/libkimproxy4-4.6.5-9.1-mdv2011.0.i586.rpm 86d9aa7a95e0b3c8c3736bced5030529 2011/i586/libkio5-4.6.5-9.1-mdv2011.0.i586.rpm 42894f5fef6b3955f4cc7cdc39a9b8b6 2011/i586/libkjs4-4.6.5-9.1-mdv2011.0.i586.rpm 5293f2f284c1df6466a84cfd33426b21 2011/i586/libkjsapi4-4.6.5-9.1-mdv2011.0.i586.rpm 600ac620222614c9240c56e35061dd5f 2011/i586/libkjsembed4-4.6.5-9.1-mdv2011.0.i586.rpm e6b032340b8f8b45f5e3dea24d4b795e 2011/i586/libkmediaplayer4-4.6.5-9.1-mdv2011.0.i586.rpm a9e4510933f71ee9354d41dc7f5c21f9 2011/i586/libknewstuff2_4-4.6.5-9.1-mdv2011.0.i586.rpm 4fffe4a09ab06dbb13e19ef552c765d3 2011/i586/libknewstuff3_4-4.6.5-9.1-mdv2011.0.i586.rpm 6176f21ff0870d298cad30f19cbc5985 2011/i586/libknotifyconfig4-4.6.5-9.1-mdv2011.0.i586.rpm aaca814c82291a16831052da452b072a 2011/i586/libkntlm4-4.6.5-9.1-mdv2011.0.i586.rpm 38441eea27e26fded337b55d1c7187b8 2011/i586/libkparts4-4.6.5-9.1-mdv2011.0.i586.rpm e1d9a6f2b3cf3546fffca8b3092b96d7 2011/i586/libkprintutils4-4.6.5-9.1-mdv2011.0.i586.rpm 78764e6b917983c8e337c69ac99d17f4 2011/i586/libkpty4-4.6.5-9.1-mdv2011.0.i586.rpm 8b727fc309bbb81de1d8ace536351303 2011/i586/libkrosscore4-4.6.5-9.1-mdv2011.0.i586.rpm 051aa118fdbcc20755754c2a4a45fdba 2011/i586/libkrossui4-4.6.5-9.1-mdv2011.0.i586.rpm c135b1698036881db6ab90cb448c265b 2011/i586/libktexteditor4-4.6.5-9.1-mdv2011.0.i586.rpm f7526412295bd86a3fdf26ad6bc8e962 2011/i586/libkunitconversion4-4.6.5-9.1-mdv2011.0.i586.rpm 603c837536ad6ca871ffe589c747c0f5 2011/i586/libkunittest4-4.6.5-9.1-mdv2011.0.i586.rpm e4c09f0fcb6f28bf768d337c62686eac 2011/i586/libkutils4-4.6.5-9.1-mdv2011.0.i586.rpm ac93402de1c9e45b65944aaeb8e425bf 2011/i586/libnepomuk4-4.6.5-9.1-mdv2011.0.i586.rpm ea8ba57a4f5e91529a074b3b5ddafb63 2011/i586/libnepomukquery4-4.6.5-9.1-mdv2011.0.i586.rpm a1ca1f682adaea8192cdf17082179790 2011/i586/libnepomukutils4-4.6.5-9.1-mdv2011.0.i586.rpm beb7c3df35c4208608541faba3e3cff1 2011/i586/libplasma3-4.6.5-9.1-mdv2011.0.i586.rpm 76cf8c65bc34fd9981ebd776fae7dd6b 2011/i586/libsolid4-4.6.5-9.1-mdv2011.0.i586.rpm 4dbe0bea09b0efcb77e4f97af52ee554 2011/i586/libthreadweaver4-4.6.5-9.1-mdv2011.0.i586.rpm 9cda5c5ab321d1d77cad4b273a8227a3 2011/SRPMS/kdelibs4-4.6.5-9.1.src.rpm
Mandriva Linux 2011/X86_64: a416f173f6fee7f10e01e940622b03c7 2011/x86_64/kdelibs4-core-4.6.5-9.1-mdv2011.0.x86_64.rpm fdc8c171954de23a0161faec669953a3 2011/x86_64/kdelibs4-devel-4.6.5-9.1-mdv2011.0.x86_64.rpm 389d42165fcb6c8853bda9f8fe352438 2011/x86_64/lib64katepartinterfaces4-4.6.5-9.1-mdv2011.0.x86_64.rpm 553e0d225fdc7335afd7571bc404b808 2011/x86_64/lib64kcmutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm 1b073a351c1e5d2c350a908e361afde7 2011/x86_64/lib64kde3support4-4.6.5-9.1-mdv2011.0.x86_64.rpm 8a10b775f1dc843404e518eb1dd15263 2011/x86_64/lib64kdecore5-4.6.5-9.1-mdv2011.0.x86_64.rpm 98b3c619dab6bcf91ebaea35dc59f24e 2011/x86_64/lib64kdefakes5-4.6.5-9.1-mdv2011.0.x86_64.rpm 3035d04055ef41dc710a9a5cfa15f48f 2011/x86_64/lib64kdesu5-4.6.5-9.1-mdv2011.0.x86_64.rpm 4bb1aade6cbc696aa298a0053a2778aa 2011/x86_64/lib64kdeui5-4.6.5-9.1-mdv2011.0.x86_64.rpm 05593647a56638371c4b06f8eec04199 2011/x86_64/lib64kdewebkit5-4.6.5-9.1-mdv2011.0.x86_64.rpm 9a61f92a25556635fdf01bd629079c05 2011/x86_64/lib64kdnssd4-4.6.5-9.1-mdv2011.0.x86_64.rpm ebb20032192f17c4d8d46d7a117d6186 2011/x86_64/lib64kemoticons4-4.6.5-9.1-mdv2011.0.x86_64.rpm 7c16488a8271d8e0440f886a1e7a3e59 2011/x86_64/lib64kfile4-4.6.5-9.1-mdv2011.0.x86_64.rpm f2b43f9f213e29c69f9bcf1fe30a0f91 2011/x86_64/lib64khtml5-4.6.5-9.1-mdv2011.0.x86_64.rpm e01dd3d898e30c921275e9e3fd7fe8a0 2011/x86_64/lib64kidletime4-4.6.5-9.1-mdv2011.0.x86_64.rpm bf2a67810c9530f7d06584fe92a086cd 2011/x86_64/lib64kimproxy4-4.6.5-9.1-mdv2011.0.x86_64.rpm 3dc38dd2200e7765178b756d18355c5e 2011/x86_64/lib64kio5-4.6.5-9.1-mdv2011.0.x86_64.rpm 479d0258813eb4ce2112efa290ac992f 2011/x86_64/lib64kjs4-4.6.5-9.1-mdv2011.0.x86_64.rpm 5821bd4cb36e6ae484fed3f3b178f64c 2011/x86_64/lib64kjsapi4-4.6.5-9.1-mdv2011.0.x86_64.rpm 97d0a7073257b5d38ebd89608b230cb2 2011/x86_64/lib64kjsembed4-4.6.5-9.1-mdv2011.0.x86_64.rpm b8201d7c86d380f53a747569c86cc125 2011/x86_64/lib64kmediaplayer4-4.6.5-9.1-mdv2011.0.x86_64.rpm a7470e5a2f9f1c2802a70386d94734d9 2011/x86_64/lib64knewstuff2_4-4.6.5-9.1-mdv2011.0.x86_64.rpm d10cff1d4ae24594f65017681b351aa4 2011/x86_64/lib64knewstuff3_4-4.6.5-9.1-mdv2011.0.x86_64.rpm 40625fb25f84a66747bfdb5e8c33397f 2011/x86_64/lib64knotifyconfig4-4.6.5-9.1-mdv2011.0.x86_64.rpm 7a58f4dad0d080ad1bb4f9d0b7b55721 2011/x86_64/lib64kntlm4-4.6.5-9.1-mdv2011.0.x86_64.rpm 216f06e8c9bc940a7c1bc96c0be60c85 2011/x86_64/lib64kparts4-4.6.5-9.1-mdv2011.0.x86_64.rpm d2bf6a48431bfa87b20274b6a916ed07 2011/x86_64/lib64kprintutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm 17e748ccf383dcd76bf54370bae5b60b 2011/x86_64/lib64kpty4-4.6.5-9.1-mdv2011.0.x86_64.rpm 2980ae5e1eb2df517b9ac30f815e2b86 2011/x86_64/lib64krosscore4-4.6.5-9.1-mdv2011.0.x86_64.rpm a3daeac9197c566f3112a0efc2a20440 2011/x86_64/lib64krossui4-4.6.5-9.1-mdv2011.0.x86_64.rpm 0eb6aa884c8725aa2cc7cc5947f10fce 2011/x86_64/lib64ktexteditor4-4.6.5-9.1-mdv2011.0.x86_64.rpm e58f316e4fe7ec5412c6f24b263f61d8 2011/x86_64/lib64kunitconversion4-4.6.5-9.1-mdv2011.0.x86_64.rpm a07e9a42d9d34450fcdaa4a81fee7e1b 2011/x86_64/lib64kunittest4-4.6.5-9.1-mdv2011.0.x86_64.rpm 34610271f7de5ba3c6226d857831162f 2011/x86_64/lib64kutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm ddf3eb523f5b29dd49b937b63d3efce7 2011/x86_64/lib64nepomuk4-4.6.5-9.1-mdv2011.0.x86_64.rpm eacd8f03c285571b4724f93b4f80525c 2011/x86_64/lib64nepomukquery4-4.6.5-9.1-mdv2011.0.x86_64.rpm 9fc98f8e2958ad971b73a887ecc25d75 2011/x86_64/lib64nepomukutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm b66922bbe21ba37ab38a362eb279b399 2011/x86_64/lib64plasma3-4.6.5-9.1-mdv2011.0.x86_64.rpm 412dee5f9cbf514d0cc8e7b6c4bb7036 2011/x86_64/lib64solid4-4.6.5-9.1-mdv2011.0.x86_64.rpm ed8eb7bd7d026d75615bda14538fe6af 2011/x86_64/lib64threadweaver4-4.6.5-9.1-mdv2011.0.x86_64.rpm 9cda5c5ab321d1d77cad4b273a8227a3 2011/SRPMS/kdelibs4-4.6.5-9.1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iD8DBQFOr+brmqjQ0CJFipgRApQNAKDVWJ591FTnmPG9EY+uaQ0yn+SKfwCg2PkW N0/0RYLF0JoU7ErOvYOPwxA= =+mKq -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2009-2408
Dan Kaminsky and Moxie Marlinspike discovered that icedove does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate (MFSA 2009-42).
CVE-2009-2404
Moxie Marlinspike reported a heap overflow vulnerability in the code that handles regular expressions in certificate names (MFSA 2009-43).
CVE-2009-2463
monarch2020 discovered an integer overflow n a base64 decoding function (MFSA 2010-07).
CVE-2009-3072
Josh Soref discovered a crash in the BinHex decoder (MFSA 2010-07).
CVE-2009-3075
Carsten Book reported a crash in the JavaScript engine (MFSA 2010-07).
CVE-2010-0163
Ludovic Hirlimann reported a crash indexing some messages with attachments, which could lead to the execution of arbitrary code (MFSA 2010-07).
For the stable distribution (lenny), these problems have been fixed in version 2.0.0.24-0lenny1.
Due to a problem with the archive system it is not possible to release all architectures. The missing architectures will be installed into the archive once they become available.
For the testing distribution squeeze and the unstable distribution (sid), these problems will be fixed soon.
We recommend that you upgrade your icedove packages.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Debian GNU/Linux 5.0 alias lenny
Debian (stable)
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24.orig.tar.gz Size/MD5 checksum: 35856543 3bf6e40cddf593ddc1a66b9e721f12b9 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.dsc Size/MD5 checksum: 1668 111c1a93c1ce498715e231272123f841 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.diff.gz Size/MD5 checksum: 103260 4661b0c8c170d58f844337699cb8ca1a
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_alpha.deb Size/MD5 checksum: 3723382 12c7fe63b0a5c59680ca36200a6f7d20 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_alpha.deb Size/MD5 checksum: 61132 c0f96569d4ea0f01cff3950572b3dda9 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_alpha.deb Size/MD5 checksum: 57375560 95a614e1cb620fad510eb51ae5cb37c5 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_alpha.deb Size/MD5 checksum: 13468190 03a629abf18130605927f5817b097bac
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_amd64.deb Size/MD5 checksum: 57584134 7d909c9f1b67d4758e290dc2c1dc01f2 http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_amd64.deb Size/MD5 checksum: 3937168 de9dda16f94e696de897bec6c8d45f90 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_amd64.deb Size/MD5 checksum: 12384488 8d1632f7511c711a1d2ea940f7e451a2 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_amd64.deb Size/MD5 checksum: 59114 fae947071c0de6ebce316decbce61f9a
arm architecture (ARM)
http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_arm.deb Size/MD5 checksum: 3929902 5ab6f673b34770278270fb7862986b0b http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_arm.deb Size/MD5 checksum: 53746 c9c53e8a42d85fe5f4fa8e2a85e55629 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_arm.deb Size/MD5 checksum: 56491578 8eb38c6f99c501556506ac6790833941 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_arm.deb Size/MD5 checksum: 10943350 d7c0badfe9210ce5341eb17ab7e71ca2
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_hppa.deb Size/MD5 checksum: 3944678 2a9dc50b61420b4fdf8f3a4d378bb484 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_hppa.deb Size/MD5 checksum: 60554 7dcd739363cff3cc4bda659b82856536 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_hppa.deb Size/MD5 checksum: 58523174 6780e8f9de0f2ed0c3bd533d03853d85 http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_hppa.deb Size/MD5 checksum: 13952170 88674f31191b07cd76ea5d366c545f1d
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_i386.deb Size/MD5 checksum: 10951904 52ce1587c6eb95b7f8b63ccedf224d88 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_i386.deb Size/MD5 checksum: 54838 101de9e837bea9391461074481bf770f http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_i386.deb Size/MD5 checksum: 3924810 6ecf3693cce2ae97fd0bbdafc1ff06f6 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_i386.deb Size/MD5 checksum: 56543048 73d1684cf69bed0441393abb46610433
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_ia64.deb Size/MD5 checksum: 3756914 615afd30bf893d2d32bbacedf1f7ff8e http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_ia64.deb Size/MD5 checksum: 16545566 0444c7198e94ab59e103e60bf86a2aa2 http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_ia64.deb Size/MD5 checksum: 66302 f8800140b3797d4a4267a5dac0043995 http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_ia64.deb Size/MD5 checksum: 57199564 5df5808f91ecdf6ac49f0e922b1a0234
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_powerpc.deb Size/MD5 checksum: 12112586 4b40106b68670c726624348c0cb8bd1f http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_powerpc.deb Size/MD5 checksum: 59511730 226cdd43af9dffb4132002044120769c http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_powerpc.deb Size/MD5 checksum: 56670 72e58731ac68f2c599704a3e7ca45d4c http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_powerpc.deb Size/MD5 checksum: 3942470 e8454d41a095226a2d252f10da795d96
These files will probably be moved into the stable distribution on its next update. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2010-0001 Synopsis: ESX Service Console updates for nss and nspr Issue date: 2010-01-06 Updated on: 2010-01-06 (initial release of advisory) CVE numbers: CVE-2009-2409 CVE-2009-2408 CVE-2009-2404 CVE-2009-1563 CVE-2009-3274 CVE-2009-3370 CVE-2009-3372 CVE-2009-3373 CVE-2009-3374 CVE-2009-3375 CVE-2009-3376 CVE-2009-3380 CVE-2009-3382
- Summary
Update for Service Console packages nss and nspr
- Relevant releases
VMware ESX 4.0 without patch ESX400-200912403-SG
- Problem Description
a.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2009-2409, CVE-2009-2408, CVE-2009-2404,
CVE-2009-1563, CVE-2009-3274, CVE-2009-3370, CVE-2009-3372,
CVE-2009-3373, CVE-2009-3374, CVE-2009-3375, CVE-2009-3376,
CVE-2009-3380, and CVE-2009-3382 to these issues.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-200912403-SG
ESX 3.5 ESX not affected
ESX 3.0.3 ESX not affected
ESX 3.0.2 ESX not affected
ESX 2.5.5 ESX not affected
vMA 4.0 RHEL5 affected, patch pending
-
hosted products are VMware Workstation, Player, ACE, Server, Fusion.
-
Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
ESX 4.0
ESX400-200912403-SG
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-181-20091231-153046/ESX400-200912001.zip md5sum: 78c6cf139b7941dc736c9d3a41deae77 sha1sum: 36df3a675fbd3c8c8830f00637e37ee716bdac59 http://kb.vmware.com/kb/1016293
To install an individual bulletin use esxupdate with the -b option. esxupdate --bundle=ESX400-200912001.zip -b ESX400-200912403-SG update
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3382
- Change log
2010-01-06 VMSA-2010-0001 Initial security advisory after release of patch ESX400-200912403-SG for ESX 4.0 on 2010-01-06.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2010 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (MingW32)
iD8DBQFLRYwLS2KysvBH1xkRArmBAJoDcO5waCyCE+lfmEwuILVjcqeLngCcCzNo HgNlBjOx5iQw7etlwwpbyuo= =bIJJ -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-01
http://security.gentoo.org/
Severity: High Title: Mozilla Products: Multiple vulnerabilities Date: January 08, 2013 Bugs: #180159, #181361, #207261, #238535, #246602, #251322, #255221, #255234, #255687, #257577, #260062, #261386, #262704, #267234, #273918, #277752, #280226, #280234, #280393, #282549, #284439, #286721, #290892, #292034, #297532, #305689, #307045, #311021, #312361, #312645, #312651, #312675, #312679, #312763, #313003, #324735, #326341, #329279, #336396, #341821, #342847, #348316, #357057, #360055, #360315, #365323, #373595, #379549, #381245, #388045, #390771, #395431, #401701, #403183, #404437, #408161, #413657, #419917, #427224, #433383, #437780, #439586, #439960, #444318 ID: 201301-01
Synopsis
Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may allow execution of arbitrary code or local privilege escalation.
Background
Mozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the 'Mozilla Application Suite'. XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications such as Firefox and Thunderbird. NSS is Mozilla's Network Security Services library that implements PKI support. IceCat is the GNU version of Firefox.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/firefox < 10.0.11 >= 10.0.11 2 www-client/firefox-bin < 10.0.11 >= 10.0.11 3 mail-client/thunderbird < 10.0.11 >= 10.0.11 4 mail-client/thunderbird-bin < 10.0.11 >= 10.0.11 5 www-client/seamonkey < 2.14-r1 >= 2.14-r1 6 www-client/seamonkey-bin < 2.14 >= 2.14 7 dev-libs/nss < 3.14 >= 3.14 8 www-client/mozilla-firefox <= 3.6.8 Vulnerable! 9 www-client/mozilla-firefox-bin <= 3.5.6 Vulnerable! 10 mail-client/mozilla-thunderbird <= 3.0.4-r1 Vulnerable! 11 mail-client/mozilla-thunderbird-bin <= 3.0 Vulnerable! 12 www-client/icecat <= 10.0-r1 Vulnerable! 13 net-libs/xulrunner <= 2.0-r1 Vulnerable! 14 net-libs/xulrunner-bin <= 1.8.1.19 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. ------------------------------------------------------------------- 14 affected packages
Description
Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL's for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser's font, conduct clickjacking attacks, or have other unspecified impact.
A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file.
Workaround
There is no known workaround at this time.
Resolution
All Mozilla Firefox users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-10.0.11"
All users of the Mozilla Firefox binary package should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-10.0.11"=
All Mozilla Thunderbird users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-10.0.11"
All users of the Mozilla Thunderbird binary package should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-10.0.11"
All Mozilla SeaMonkey users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-2.14-r1"
All users of the Mozilla SeaMonkey binary package should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-2.14"
All NSS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.14"
The "www-client/mozilla-firefox" package has been merged into the "www-client/firefox" package. To upgrade, please unmerge "www-client/mozilla-firefox" and then emerge the latest "www-client/firefox" package:
# emerge --sync # emerge --unmerge "www-client/mozilla-firefox" # emerge --ask --oneshot --verbose ">=www-client/firefox-10.0.11"
The "www-client/mozilla-firefox-bin" package has been merged into the "www-client/firefox-bin" package. To upgrade, please unmerge "www-client/mozilla-firefox-bin" and then emerge the latest "www-client/firefox-bin" package:
# emerge --sync # emerge --unmerge "www-client/mozilla-firefox-bin" # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-10.0.11"=
The "mail-client/mozilla-thunderbird" package has been merged into the "mail-client/thunderbird" package. To upgrade, please unmerge "mail-client/mozilla-thunderbird" and then emerge the latest "mail-client/thunderbird" package:
# emerge --sync # emerge --unmerge "mail-client/mozilla-thunderbird" # emerge --ask --oneshot -v ">=mail-client/thunderbird-10.0.11"
The "mail-client/mozilla-thunderbird-bin" package has been merged into the "mail-client/thunderbird-bin" package. To upgrade, please unmerge "mail-client/mozilla-thunderbird-bin" and then emerge the latest "mail-client/thunderbird-bin" package:
# emerge --sync # emerge --unmerge "mail-client/mozilla-thunderbird-bin" # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-10.0.11"
Gentoo discontinued support for GNU IceCat. We recommend that users unmerge GNU IceCat:
# emerge --unmerge "www-client/icecat"
Gentoo discontinued support for XULRunner. We recommend that users unmerge XULRunner:
# emerge --unmerge "net-libs/xulrunner"
Gentoo discontinued support for the XULRunner binary package. We recommend that users unmerge XULRunner:
# emerge --unmerge "net-libs/xulrunner-bin"
References
[ 1 ] CVE-2011-3101 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3101 [ 2 ] CVE-2007-2436 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2436 [ 3 ] CVE-2007-2437 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2437 [ 4 ] CVE-2007-2671 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2671 [ 5 ] CVE-2007-3073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3073 [ 6 ] CVE-2008-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0016 [ 7 ] CVE-2008-0017 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0017 [ 8 ] CVE-2008-0367 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0367 [ 9 ] CVE-2008-3835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3835 [ 10 ] CVE-2008-3836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3836 [ 11 ] CVE-2008-3837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3837 [ 12 ] CVE-2008-4058 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4058 [ 13 ] CVE-2008-4059 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4059 [ 14 ] CVE-2008-4060 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4060 [ 15 ] CVE-2008-4061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4061 [ 16 ] CVE-2008-4062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4062 [ 17 ] CVE-2008-4063 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4063 [ 18 ] CVE-2008-4064 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4064 [ 19 ] CVE-2008-4065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4065 [ 20 ] CVE-2008-4066 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4066 [ 21 ] CVE-2008-4067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4067 [ 22 ] CVE-2008-4068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4068 [ 23 ] CVE-2008-4069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4069 [ 24 ] CVE-2008-4070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4070 [ 25 ] CVE-2008-4582 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4582 [ 26 ] CVE-2008-5012 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5012 [ 27 ] CVE-2008-5013 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5013 [ 28 ] CVE-2008-5014 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5014 [ 29 ] CVE-2008-5015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5015 [ 30 ] CVE-2008-5016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5016 [ 31 ] CVE-2008-5017 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5017 [ 32 ] CVE-2008-5018 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5018 [ 33 ] CVE-2008-5019 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5019 [ 34 ] CVE-2008-5021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5021 [ 35 ] CVE-2008-5022 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5022 [ 36 ] CVE-2008-5023 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5023 [ 37 ] CVE-2008-5024 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5024 [ 38 ] CVE-2008-5052 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5052 [ 39 ] CVE-2008-5500 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5500 [ 40 ] CVE-2008-5501 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5501 [ 41 ] CVE-2008-5502 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5502 [ 42 ] CVE-2008-5503 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5503 [ 43 ] CVE-2008-5504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5504 [ 44 ] CVE-2008-5505 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5505 [ 45 ] CVE-2008-5506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5506 [ 46 ] CVE-2008-5507 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5507 [ 47 ] CVE-2008-5508 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5508 [ 48 ] CVE-2008-5510 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5510 [ 49 ] CVE-2008-5511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5511 [ 50 ] CVE-2008-5512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5512 [ 51 ] CVE-2008-5513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5513 [ 52 ] CVE-2008-5822 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5822 [ 53 ] CVE-2008-5913 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5913 [ 54 ] CVE-2008-6961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6961 [ 55 ] CVE-2009-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071 [ 56 ] CVE-2009-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071 [ 57 ] CVE-2009-0352 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0352 [ 58 ] CVE-2009-0353 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0353 [ 59 ] CVE-2009-0354 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0354 [ 60 ] CVE-2009-0355 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0355 [ 61 ] CVE-2009-0356 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0356 [ 62 ] CVE-2009-0357 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0357 [ 63 ] CVE-2009-0358 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0358 [ 64 ] CVE-2009-0652 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0652 [ 65 ] CVE-2009-0771 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0771 [ 66 ] CVE-2009-0772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0772 [ 67 ] CVE-2009-0773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0773 [ 68 ] CVE-2009-0774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0774 [ 69 ] CVE-2009-0775 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0775 [ 70 ] CVE-2009-0776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0776 [ 71 ] CVE-2009-0777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0777 [ 72 ] CVE-2009-1044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1044 [ 73 ] CVE-2009-1169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1169 [ 74 ] CVE-2009-1302 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1302 [ 75 ] CVE-2009-1303 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1303 [ 76 ] CVE-2009-1304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1304 [ 77 ] CVE-2009-1305 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1305 [ 78 ] CVE-2009-1306 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1306 [ 79 ] CVE-2009-1307 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1307 [ 80 ] CVE-2009-1308 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1308 [ 81 ] CVE-2009-1309 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1309 [ 82 ] CVE-2009-1310 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1310 [ 83 ] CVE-2009-1311 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1311 [ 84 ] CVE-2009-1312 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1312 [ 85 ] CVE-2009-1313 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1313 [ 86 ] CVE-2009-1392 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1392 [ 87 ] CVE-2009-1563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1563 [ 88 ] CVE-2009-1571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1571 [ 89 ] CVE-2009-1828 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1828 [ 90 ] CVE-2009-1832 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1832 [ 91 ] CVE-2009-1833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1833 [ 92 ] CVE-2009-1834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1834 [ 93 ] CVE-2009-1835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1835 [ 94 ] CVE-2009-1836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1836 [ 95 ] CVE-2009-1837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1837 [ 96 ] CVE-2009-1838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1838 [ 97 ] CVE-2009-1839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1839 [ 98 ] CVE-2009-1840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1840 [ 99 ] CVE-2009-1841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1841 [ 100 ] CVE-2009-2043 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2043 [ 101 ] CVE-2009-2044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2044 [ 102 ] CVE-2009-2061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2061 [ 103 ] CVE-2009-2065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2065 [ 104 ] CVE-2009-2210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2210 [ 105 ] CVE-2009-2404 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2404 [ 106 ] CVE-2009-2408 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2408 [ 107 ] CVE-2009-2462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2462 [ 108 ] CVE-2009-2463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2463 [ 109 ] CVE-2009-2464 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2464 [ 110 ] CVE-2009-2465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2465 [ 111 ] CVE-2009-2466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2466 [ 112 ] CVE-2009-2467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2467 [ 113 ] CVE-2009-2469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2469 [ 114 ] CVE-2009-2470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2470 [ 115 ] CVE-2009-2471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2471 [ 116 ] CVE-2009-2472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2472 [ 117 ] CVE-2009-2477 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2477 [ 118 ] CVE-2009-2478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2478 [ 119 ] CVE-2009-2479 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2479 [ 120 ] CVE-2009-2535 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2535 [ 121 ] CVE-2009-2654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2654 [ 122 ] CVE-2009-2662 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2662 [ 123 ] CVE-2009-2664 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2664 [ 124 ] CVE-2009-2665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2665 [ 125 ] CVE-2009-3069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3069 [ 126 ] CVE-2009-3070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3070 [ 127 ] CVE-2009-3071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3071 [ 128 ] CVE-2009-3072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3072 [ 129 ] CVE-2009-3074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3074 [ 130 ] CVE-2009-3075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3075 [ 131 ] CVE-2009-3076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3076 [ 132 ] CVE-2009-3077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3077 [ 133 ] CVE-2009-3078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3078 [ 134 ] CVE-2009-3079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3079 [ 135 ] CVE-2009-3274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3274 [ 136 ] CVE-2009-3371 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3371 [ 137 ] CVE-2009-3372 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3372 [ 138 ] CVE-2009-3373 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3373 [ 139 ] CVE-2009-3374 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3374 [ 140 ] CVE-2009-3375 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3375 [ 141 ] CVE-2009-3376 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3376 [ 142 ] CVE-2009-3377 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3377 [ 143 ] CVE-2009-3378 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3378 [ 144 ] CVE-2009-3379 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3379 [ 145 ] CVE-2009-3380 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3380 [ 146 ] CVE-2009-3381 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3381 [ 147 ] CVE-2009-3382 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3382 [ 148 ] CVE-2009-3383 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3383 [ 149 ] CVE-2009-3388 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388 [ 150 ] CVE-2009-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389 [ 151 ] CVE-2009-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555 [ 152 ] CVE-2009-3978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3978 [ 153 ] CVE-2009-3979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979 [ 154 ] CVE-2009-3980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3980 [ 155 ] CVE-2009-3981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3981 [ 156 ] CVE-2009-3982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982 [ 157 ] CVE-2009-3983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983 [ 158 ] CVE-2009-3984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984 [ 159 ] CVE-2009-3985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985 [ 160 ] CVE-2009-3986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986 [ 161 ] CVE-2009-3987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987 [ 162 ] CVE-2009-3988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3988 [ 163 ] CVE-2010-0159 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0159 [ 164 ] CVE-2010-0160 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0160 [ 165 ] CVE-2010-0162 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0162 [ 166 ] CVE-2010-0163 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0163 [ 167 ] CVE-2010-0164 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0164 [ 168 ] CVE-2010-0165 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0165 [ 169 ] CVE-2010-0166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0166 [ 170 ] CVE-2010-0167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167 [ 171 ] CVE-2010-0167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167 [ 172 ] CVE-2010-0168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0168 [ 173 ] CVE-2010-0169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169 [ 174 ] CVE-2010-0169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169 [ 175 ] CVE-2010-0170 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0170 [ 176 ] CVE-2010-0171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171 [ 177 ] CVE-2010-0171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171 [ 178 ] CVE-2010-0172 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0172 [ 179 ] CVE-2010-0173 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0173 [ 180 ] CVE-2010-0174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174 [ 181 ] CVE-2010-0174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174 [ 182 ] CVE-2010-0175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175 [ 183 ] CVE-2010-0175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175 [ 184 ] CVE-2010-0176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176 [ 185 ] CVE-2010-0176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176 [ 186 ] CVE-2010-0177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0177 [ 187 ] CVE-2010-0178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0178 [ 188 ] CVE-2010-0179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0179 [ 189 ] CVE-2010-0181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0181 [ 190 ] CVE-2010-0182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0182 [ 191 ] CVE-2010-0183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0183 [ 192 ] CVE-2010-0220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0220 [ 193 ] CVE-2010-0648 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0648 [ 194 ] CVE-2010-0654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0654 [ 195 ] CVE-2010-1028 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1028 [ 196 ] CVE-2010-1121 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1121 [ 197 ] CVE-2010-1125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1125 [ 198 ] CVE-2010-1196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1196 [ 199 ] CVE-2010-1197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1197 [ 200 ] CVE-2010-1198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1198 [ 201 ] CVE-2010-1199 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1199 [ 202 ] CVE-2010-1200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1200 [ 203 ] CVE-2010-1201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1201 [ 204 ] CVE-2010-1202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1202 [ 205 ] CVE-2010-1203 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1203 [ 206 ] CVE-2010-1205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205 [ 207 ] CVE-2010-1206 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1206 [ 208 ] CVE-2010-1207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1207 [ 209 ] CVE-2010-1208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1208 [ 210 ] CVE-2010-1209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1209 [ 211 ] CVE-2010-1210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1210 [ 212 ] CVE-2010-1211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1211 [ 213 ] CVE-2010-1212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1212 [ 214 ] CVE-2010-1213 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1213 [ 215 ] CVE-2010-1214 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1214 [ 216 ] CVE-2010-1215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1215 [ 217 ] CVE-2010-1585 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1585 [ 218 ] CVE-2010-2751 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2751 [ 219 ] CVE-2010-2752 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2752 [ 220 ] CVE-2010-2753 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2753 [ 221 ] CVE-2010-2754 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2754 [ 222 ] CVE-2010-2755 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2755 [ 223 ] CVE-2010-2760 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2760 [ 224 ] CVE-2010-2762 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2762 [ 225 ] CVE-2010-2763 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2763 [ 226 ] CVE-2010-2764 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2764 [ 227 ] CVE-2010-2765 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2765 [ 228 ] CVE-2010-2766 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2766 [ 229 ] CVE-2010-2767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2767 [ 230 ] CVE-2010-2768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2768 [ 231 ] CVE-2010-2769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2769 [ 232 ] CVE-2010-2770 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2770 [ 233 ] CVE-2010-3131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3131 [ 234 ] CVE-2010-3166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3166 [ 235 ] CVE-2010-3167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3167 [ 236 ] CVE-2010-3168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3168 [ 237 ] CVE-2010-3169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3169 [ 238 ] CVE-2010-3170 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3170 [ 239 ] CVE-2010-3171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3171 [ 240 ] CVE-2010-3173 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3173 [ 241 ] CVE-2010-3174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3174 [ 242 ] CVE-2010-3175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3175 [ 243 ] CVE-2010-3176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3176 [ 244 ] CVE-2010-3177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3177 [ 245 ] CVE-2010-3178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3178 [ 246 ] CVE-2010-3179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3179 [ 247 ] CVE-2010-3180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3180 [ 248 ] CVE-2010-3182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3182 [ 249 ] CVE-2010-3183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3183 [ 250 ] CVE-2010-3399 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3399 [ 251 ] CVE-2010-3400 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3400 [ 252 ] CVE-2010-3765 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3765 [ 253 ] CVE-2010-3766 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3766 [ 254 ] CVE-2010-3767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3767 [ 255 ] CVE-2010-3768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3768 [ 256 ] CVE-2010-3769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3769 [ 257 ] CVE-2010-3770 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3770 [ 258 ] CVE-2010-3771 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3771 [ 259 ] CVE-2010-3772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3772 [ 260 ] CVE-2010-3773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3773 [ 261 ] CVE-2010-3774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3774 [ 262 ] CVE-2010-3775 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3775 [ 263 ] CVE-2010-3776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3776 [ 264 ] CVE-2010-3777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3777 [ 265 ] CVE-2010-3778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3778 [ 266 ] CVE-2010-4508 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4508 [ 267 ] CVE-2010-5074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5074 [ 268 ] CVE-2011-0051 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0051 [ 269 ] CVE-2011-0053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0053 [ 270 ] CVE-2011-0054 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0054 [ 271 ] CVE-2011-0055 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0055 [ 272 ] CVE-2011-0056 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0056 [ 273 ] CVE-2011-0057 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0057 [ 274 ] CVE-2011-0058 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0058 [ 275 ] CVE-2011-0059 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0059 [ 276 ] CVE-2011-0061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0061 [ 277 ] CVE-2011-0062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0062 [ 278 ] CVE-2011-0065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0065 [ 279 ] CVE-2011-0066 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0066 [ 280 ] CVE-2011-0067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0067 [ 281 ] CVE-2011-0068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0068 [ 282 ] CVE-2011-0069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0069 [ 283 ] CVE-2011-0070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0070 [ 284 ] CVE-2011-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0071 [ 285 ] CVE-2011-0072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0072 [ 286 ] CVE-2011-0073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0073 [ 287 ] CVE-2011-0074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0074 [ 288 ] CVE-2011-0075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0075 [ 289 ] CVE-2011-0076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0076 [ 290 ] CVE-2011-0077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0077 [ 291 ] CVE-2011-0078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0078 [ 292 ] CVE-2011-0079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0079 [ 293 ] CVE-2011-0080 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0080 [ 294 ] CVE-2011-0081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0081 [ 295 ] CVE-2011-0082 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0082 [ 296 ] CVE-2011-0083 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0083 [ 297 ] CVE-2011-0084 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0084 [ 298 ] CVE-2011-0085 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0085 [ 299 ] CVE-2011-1187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1187 [ 300 ] CVE-2011-1202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1202 [ 301 ] CVE-2011-1712 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1712 [ 302 ] CVE-2011-2362 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2362 [ 303 ] CVE-2011-2363 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2363 [ 304 ] CVE-2011-2364 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2364 [ 305 ] CVE-2011-2365 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2365 [ 306 ] CVE-2011-2369 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2369 [ 307 ] CVE-2011-2370 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2370 [ 308 ] CVE-2011-2371 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2371 [ 309 ] CVE-2011-2372 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2372 [ 310 ] CVE-2011-2373 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2373 [ 311 ] CVE-2011-2374 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2374 [ 312 ] CVE-2011-2375 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2375 [ 313 ] CVE-2011-2376 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2376 [ 314 ] CVE-2011-2377 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2377 [ 315 ] CVE-2011-2378 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2378 [ 316 ] CVE-2011-2605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2605 [ 317 ] CVE-2011-2980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2980 [ 318 ] CVE-2011-2981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2981 [ 319 ] CVE-2011-2982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2982 [ 320 ] CVE-2011-2983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2983 [ 321 ] CVE-2011-2984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2984 [ 322 ] CVE-2011-2985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2985 [ 323 ] CVE-2011-2986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2986 [ 324 ] CVE-2011-2987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2987 [ 325 ] CVE-2011-2988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2988 [ 326 ] CVE-2011-2989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2989 [ 327 ] CVE-2011-2990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2990 [ 328 ] CVE-2011-2991 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2991 [ 329 ] CVE-2011-2993 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2993 [ 330 ] CVE-2011-2995 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2995 [ 331 ] CVE-2011-2996 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2996 [ 332 ] CVE-2011-2997 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2997 [ 333 ] CVE-2011-2998 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2998 [ 334 ] CVE-2011-2999 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2999 [ 335 ] CVE-2011-3000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3000 [ 336 ] CVE-2011-3001 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3001 [ 337 ] CVE-2011-3002 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3002 [ 338 ] CVE-2011-3003 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3003 [ 339 ] CVE-2011-3004 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3004 [ 340 ] CVE-2011-3005 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3005 [ 341 ] CVE-2011-3026 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026 [ 342 ] CVE-2011-3062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3062 [ 343 ] CVE-2011-3232 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3232 [ 344 ] CVE-2011-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389 [ 345 ] CVE-2011-3640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3640 [ 346 ] CVE-2011-3647 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3647 [ 347 ] CVE-2011-3648 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3648 [ 348 ] CVE-2011-3649 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3649 [ 349 ] CVE-2011-3650 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3650 [ 350 ] CVE-2011-3651 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3651 [ 351 ] CVE-2011-3652 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3652 [ 352 ] CVE-2011-3653 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3653 [ 353 ] CVE-2011-3654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3654 [ 354 ] CVE-2011-3655 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3655 [ 355 ] CVE-2011-3658 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3658 [ 356 ] CVE-2011-3659 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3659 [ 357 ] CVE-2011-3660 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3660 [ 358 ] CVE-2011-3661 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3661 [ 359 ] CVE-2011-3663 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3663 [ 360 ] CVE-2011-3665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3665 [ 361 ] CVE-2011-3670 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3670 [ 362 ] CVE-2011-3866 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3866 [ 363 ] CVE-2011-4688 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4688 [ 364 ] CVE-2012-0441 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0441 [ 365 ] CVE-2012-0442 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0442 [ 366 ] CVE-2012-0443 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0443 [ 367 ] CVE-2012-0444 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0444 [ 368 ] CVE-2012-0445 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0445 [ 369 ] CVE-2012-0446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0446 [ 370 ] CVE-2012-0447 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0447 [ 371 ] CVE-2012-0449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0449 [ 372 ] CVE-2012-0450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0450 [ 373 ] CVE-2012-0451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0451 [ 374 ] CVE-2012-0452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0452 [ 375 ] CVE-2012-0455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0455 [ 376 ] CVE-2012-0456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0456 [ 377 ] CVE-2012-0457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0457 [ 378 ] CVE-2012-0458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0458 [ 379 ] CVE-2012-0459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0459 [ 380 ] CVE-2012-0460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0460 [ 381 ] CVE-2012-0461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0461 [ 382 ] CVE-2012-0462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0462 [ 383 ] CVE-2012-0463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0463 [ 384 ] CVE-2012-0464 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0464 [ 385 ] CVE-2012-0467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0467 [ 386 ] CVE-2012-0468 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0468 [ 387 ] CVE-2012-0469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0469 [ 388 ] CVE-2012-0470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0470 [ 389 ] CVE-2012-0471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0471 [ 390 ] CVE-2012-0473 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0473 [ 391 ] CVE-2012-0474 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0474 [ 392 ] CVE-2012-0475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0475 [ 393 ] CVE-2012-0477 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0477 [ 394 ] CVE-2012-0478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0478 [ 395 ] CVE-2012-0479 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0479 [ 396 ] CVE-2012-1937 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1937 [ 397 ] CVE-2012-1938 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1938 [ 398 ] CVE-2012-1939 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1939 [ 399 ] CVE-2012-1940 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1940 [ 400 ] CVE-2012-1941 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1941 [ 401 ] CVE-2012-1945 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1945 [ 402 ] CVE-2012-1946 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1946 [ 403 ] CVE-2012-1947 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1947 [ 404 ] CVE-2012-1948 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1948 [ 405 ] CVE-2012-1949 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1949 [ 406 ] CVE-2012-1950 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1950 [ 407 ] CVE-2012-1951 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1951 [ 408 ] CVE-2012-1952 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1952 [ 409 ] CVE-2012-1953 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1953 [ 410 ] CVE-2012-1954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1954 [ 411 ] CVE-2012-1955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1955 [ 412 ] CVE-2012-1956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1956 [ 413 ] CVE-2012-1957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1957 [ 414 ] CVE-2012-1958 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1958 [ 415 ] CVE-2012-1959 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1959 [ 416 ] CVE-2012-1960 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1960 [ 417 ] CVE-2012-1961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1961 [ 418 ] CVE-2012-1962 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1962 [ 419 ] CVE-2012-1963 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1963 [ 420 ] CVE-2012-1964 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1964 [ 421 ] CVE-2012-1965 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1965 [ 422 ] CVE-2012-1966 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1966 [ 423 ] CVE-2012-1967 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1967 [ 424 ] CVE-2012-1970 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1970 [ 425 ] CVE-2012-1971 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1971 [ 426 ] CVE-2012-1972 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1972 [ 427 ] CVE-2012-1973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1973 [ 428 ] CVE-2012-1974 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1974 [ 429 ] CVE-2012-1975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1975 [ 430 ] CVE-2012-1976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1976 [ 431 ] CVE-2012-1994 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1994 [ 432 ] CVE-2012-3956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3956 [ 433 ] CVE-2012-3957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3957 [ 434 ] CVE-2012-3958 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3958 [ 435 ] CVE-2012-3959 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3959 [ 436 ] CVE-2012-3960 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3960 [ 437 ] CVE-2012-3961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3961 [ 438 ] CVE-2012-3962 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3962 [ 439 ] CVE-2012-3963 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3963 [ 440 ] CVE-2012-3964 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3964 [ 441 ] CVE-2012-3965 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3965 [ 442 ] CVE-2012-3966 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3966 [ 443 ] CVE-2012-3967 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3967 [ 444 ] CVE-2012-3968 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3968 [ 445 ] CVE-2012-3969 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3969 [ 446 ] CVE-2012-3970 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3970 [ 447 ] CVE-2012-3971 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3971 [ 448 ] CVE-2012-3972 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3972 [ 449 ] CVE-2012-3973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3973 [ 450 ] CVE-2012-3975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3975 [ 451 ] CVE-2012-3976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3976 [ 452 ] CVE-2012-3977 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3977 [ 453 ] CVE-2012-3978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3978 [ 454 ] CVE-2012-3980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3980 [ 455 ] CVE-2012-3982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3982 [ 456 ] CVE-2012-3984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3984 [ 457 ] CVE-2012-3985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3985 [ 458 ] CVE-2012-3986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3986 [ 459 ] CVE-2012-3988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3988 [ 460 ] CVE-2012-3989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3989 [ 461 ] CVE-2012-3990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3990 [ 462 ] CVE-2012-3991 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3991 [ 463 ] CVE-2012-3992 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3992 [ 464 ] CVE-2012-3993 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3993 [ 465 ] CVE-2012-3994 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3994 [ 466 ] CVE-2012-3995 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3995 [ 467 ] CVE-2012-4179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4179 [ 468 ] CVE-2012-4180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4180 [ 469 ] CVE-2012-4181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4181 [ 470 ] CVE-2012-4182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4182 [ 471 ] CVE-2012-4183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4183 [ 472 ] CVE-2012-4184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4184 [ 473 ] CVE-2012-4185 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4185 [ 474 ] CVE-2012-4186 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4186 [ 475 ] CVE-2012-4187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4187 [ 476 ] CVE-2012-4188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4188 [ 477 ] CVE-2012-4190 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4190 [ 478 ] CVE-2012-4191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4191 [ 479 ] CVE-2012-4192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4192 [ 480 ] CVE-2012-4193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4193 [ 481 ] CVE-2012-4194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4194 [ 482 ] CVE-2012-4195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4195 [ 483 ] CVE-2012-4196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4196 [ 484 ] CVE-2012-4201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4201 [ 485 ] CVE-2012-4202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4202 [ 486 ] CVE-2012-4204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4204 [ 487 ] CVE-2012-4205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4205 [ 488 ] CVE-2012-4206 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4206 [ 489 ] CVE-2012-4207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4207 [ 490 ] CVE-2012-4208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4208 [ 491 ] CVE-2012-4209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4209 [ 492 ] CVE-2012-4210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4210 [ 493 ] CVE-2012-4212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4212 [ 494 ] CVE-2012-4215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4215 [ 495 ] CVE-2012-4216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4216 [ 496 ] CVE-2012-5354 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5354 [ 497 ] CVE-2012-5829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5829 [ 498 ] CVE-2012-5830 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5830 [ 499 ] CVE-2012-5833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5833 [ 500 ] CVE-2012-5835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5835 [ 501 ] CVE-2012-5836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5836 [ 502 ] CVE-2012-5838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5838 [ 503 ] CVE-2012-5839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5839 [ 504 ] CVE-2012-5840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5840 [ 505 ] CVE-2012-5841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5841 [ 506 ] CVE-2012-5842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5842 [ 507 ] CVE-2012-5843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5843 [ 508 ] Firefox Blocking Fraudulent Certificates
http://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-c= ertificates/ [ 509 ] Mozilla Foundation Security Advisory 2011-11 http://www.mozilla.org/security/announce/2011/mfsa2011-11.html [ 510 ] Mozilla Foundation Security Advisory 2011-34 http://www.mozilla.org/security/announce/2011/mfsa2011-34.html
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201301-01.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: Network Security Services Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA36093
VERIFY ADVISORY: http://secunia.com/advisories/36093/
DESCRIPTION: Some vulnerabilities have been reported in Network Security Services, which can potentially be exploited by malicious people to bypass certain security restrictions or to compromise a vulnerable system.
1) An error in the regular expression parser when matching common names in certificates can be exploited to cause a heap-based buffer overflow, e.g. via a specially crafted certificate signed by a trusted CA or when a user accepts a specially crafted certificate.
2) An error exists in the parsing of certain certificate fields, which can be exploited to e.g. get a client to accept a specially crafted certificate by mistake.
SOLUTION: Update to version 3.12.3 or later.
PROVIDED AND/OR DISCOVERED BY: Red Hat credits: 1) Moxie Marlinspike 2) Dan Kaminsky
ORIGINAL ADVISORY: https://bugzilla.redhat.com/show_bug.cgi?id=512912 https://bugzilla.redhat.com/show_bug.cgi?id=510251
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
This update fixes these vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200907-0748",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "linux enterprise",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11.0"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "8.10"
},
{
"model": "firefox",
"scope": "lt",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.0.13"
},
{
"model": "opensuse",
"scope": "gte",
"trust": 1.0,
"vendor": "opensuse",
"version": "10.3"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "9"
},
{
"model": "opensuse",
"scope": "lte",
"trust": 1.0,
"vendor": "opensuse",
"version": "11.1"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "9.04"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "5.0"
},
{
"model": "thunderbird",
"scope": "lt",
"trust": 1.0,
"vendor": "mozilla",
"version": "2.0.0.23"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "8.04"
},
{
"model": "network security services",
"scope": "lt",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.12.3"
},
{
"model": "seamonkey",
"scope": "lt",
"trust": 1.0,
"vendor": "mozilla",
"version": "1.1.18"
},
{
"model": "linux enterprise",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10.0"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.0.4"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.5.0.3"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.4.1"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.0.7"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.0.6"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.5.0.4"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.5.0.2"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.0.8"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.5.0.11"
},
{
"model": "firefox",
"scope": "eq",
"trust": 0.6,
"vendor": "mozilla",
"version": "1.5.0.5"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
},
{
"db": "NVD",
"id": "CVE-2009-2408"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Dan KaminskyMoxie Marlinspike",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
}
],
"trust": 0.6
},
"cve": "CVE-2009-2408",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2009-2408",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-39854",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"id": "CVE-2009-2408",
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2009-2408",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200907-442",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-39854",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-39854"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
},
{
"db": "NVD",
"id": "CVE-2009-2408"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5. There is a mismatch between the NSS library\u0027s handling of the domain name in the SSL certificate between the SSL client and the CA that issued the server certificate. If a malicious user requests a certificate from a hostname with an invalid null character, most CAs will issue a certificate as long as the requester has the domain specified after the null character, but most SSL clients (browsers) will ignore this part of the name, Using a null character before the portion of validation allows an attacker to use a fake certificate in a man-in-the-middle attack to establish a false trust relationship. \n \n A vulnerability was found in xmltok_impl.c (expat) that with\n specially crafted XML could be exploited and lead to a denial of\n service attack. Related to CVE-2009-2625 (CVE-2009-3720). \n \n This update provides the latest version of Thunderbird which are not\n vulnerable to these issues. \n\n Update:\n\n Packages for 2008.0 are being provided due to extended support for\n Corporate products. \n \n An input sanitization flaw was found in the KSSL (KDE SSL Wrapper)\n API. An attacker could supply a specially-crafted SSL certificate\n (for example, via a web page) to an application using KSSL, such\n as the Konqueror web browser, causing misleading information to be\n presented to the user, possibly tricking them into accepting the\n certificate as valid (CVE-2011-3365). \n \n The updated packages have been patched to correct these issues. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2702\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3365\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2010.1:\n 8c6545c176b2716248c33e52135a3e2d 2010.1/i586/kdelibs4-core-4.4.5-0.4mdv2010.2.i586.rpm\n e54c7a21386ff85f46471fda6135ff6c 2010.1/i586/kdelibs4-devel-4.4.5-0.4mdv2010.2.i586.rpm\n 243c4d3db4a9e95a393f97e74818488e 2010.1/i586/libkde3support4-4.4.5-0.4mdv2010.2.i586.rpm\n 2b62c63d46a66adf26667731ddca4a06 2010.1/i586/libkdecore5-4.4.5-0.4mdv2010.2.i586.rpm\n 025038d3783371e8f46d11eaf204e65f 2010.1/i586/libkdefakes5-4.4.5-0.4mdv2010.2.i586.rpm\n 9a3bfa3d242e1d45194c4f55f812c67d 2010.1/i586/libkdesu5-4.4.5-0.4mdv2010.2.i586.rpm\n e9c69b97be0d6c7adcf7233c1d590dc6 2010.1/i586/libkdeui5-4.4.5-0.4mdv2010.2.i586.rpm\n 1ecfc8e228818bf267979da7428ba24a 2010.1/i586/libkdewebkit5-4.4.5-0.4mdv2010.2.i586.rpm\n 2be64f84a3a0160d353eaf4a66c88b1c 2010.1/i586/libkdnssd4-4.4.5-0.4mdv2010.2.i586.rpm\n 44fc6a0928497b64217bc06637ecc219 2010.1/i586/libkfile4-4.4.5-0.4mdv2010.2.i586.rpm\n e148b42fa8180b02aa3c7c54089cd16e 2010.1/i586/libkhtml5-4.4.5-0.4mdv2010.2.i586.rpm\n c17229d3aff113fee855eb647b2ee891 2010.1/i586/libkimproxy4-4.4.5-0.4mdv2010.2.i586.rpm\n 19876055e3b367010fd3a156a86a36ad 2010.1/i586/libkio5-4.4.5-0.4mdv2010.2.i586.rpm\n 5090009d080971d3ab92f788f18f1e26 2010.1/i586/libkjs4-4.4.5-0.4mdv2010.2.i586.rpm\n 8c2065a0cb35e2cc182b6bd0db267d62 2010.1/i586/libkjsapi4-4.4.5-0.4mdv2010.2.i586.rpm\n ed3966642b6a5d54ecffb6fc9a8b6290 2010.1/i586/libkjsembed4-4.4.5-0.4mdv2010.2.i586.rpm\n 008fe65285eaf4ba2d9f7c0655230c52 2010.1/i586/libkmediaplayer4-4.4.5-0.4mdv2010.2.i586.rpm\n 001fbc71b4da46f199b505c58e0c6228 2010.1/i586/libknewstuff2_4-4.4.5-0.4mdv2010.2.i586.rpm\n 672553fad8848265e1ba408f43bf7781 2010.1/i586/libknewstuff34-4.4.5-0.4mdv2010.2.i586.rpm\n 13cf045179be91975700fa3310a0fc70 2010.1/i586/libknotifyconfig4-4.4.5-0.4mdv2010.2.i586.rpm\n 3752242079665a17a3a35ac4c05484bd 2010.1/i586/libkntlm4-4.4.5-0.4mdv2010.2.i586.rpm\n af471317415306fdfbb5ff9d3c49ceea 2010.1/i586/libkparts4-4.4.5-0.4mdv2010.2.i586.rpm\n 8d3c2e7c7ba723e56bc090786d1bf96c 2010.1/i586/libkpty4-4.4.5-0.4mdv2010.2.i586.rpm\n b5648f3780cdc55c57a0d03d3fb7cc97 2010.1/i586/libkrosscore4-4.4.5-0.4mdv2010.2.i586.rpm\n ea771f370b730efa9c4019c8ceac1c22 2010.1/i586/libkrossui4-4.4.5-0.4mdv2010.2.i586.rpm\n 44dc92b4ff070db13c9dfb4954dcfa75 2010.1/i586/libktexteditor4-4.4.5-0.4mdv2010.2.i586.rpm\n 926b45cc828f8f53d63a6030d278e5bd 2010.1/i586/libkunitconversion4-4.4.5-0.4mdv2010.2.i586.rpm\n 4fd1c96ffa938806a5d055a4b61c3845 2010.1/i586/libkunittest4-4.4.5-0.4mdv2010.2.i586.rpm\n 99a712d56d383e91b17ac560a109d9ce 2010.1/i586/libkutils4-4.4.5-0.4mdv2010.2.i586.rpm\n 5db891d08fcfbe866da4a2cfc2c101ed 2010.1/i586/libnepomuk4-4.4.5-0.4mdv2010.2.i586.rpm\n 853dc3a02d9783bc7d4ed5586271f82a 2010.1/i586/libnepomukquery4-4.4.5-0.4mdv2010.2.i586.rpm\n 0b4d63fd1d8edd42a74ae1832694ef84 2010.1/i586/libplasma3-4.4.5-0.4mdv2010.2.i586.rpm\n fb356f0eb954f2871f0bd91ef4981f74 2010.1/i586/libsolid4-4.4.5-0.4mdv2010.2.i586.rpm\n ee166bc5ab6785306f330e4e13b59938 2010.1/i586/libthreadweaver4-4.4.5-0.4mdv2010.2.i586.rpm \n a3bd1963ad774911ef4d1902ce33aec9 2010.1/SRPMS/kdelibs4-4.4.5-0.4mdv2010.2.src.rpm\n\n Mandriva Linux 2010.1/X86_64:\n e4f1f7f8407938fae5eee9be6daf6463 2010.1/x86_64/kdelibs4-core-4.4.5-0.4mdv2010.2.x86_64.rpm\n afc1815bfb3e5c1b17a5e774a86d8262 2010.1/x86_64/kdelibs4-devel-4.4.5-0.4mdv2010.2.x86_64.rpm\n acabd29c100952c3a8268f6e48ae729c 2010.1/x86_64/lib64kde3support4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 4496e00fc526e1b331d5f7553ad759ab 2010.1/x86_64/lib64kdecore5-4.4.5-0.4mdv2010.2.x86_64.rpm\n 9f6dfb1b7af9299fb96941926e7d69e9 2010.1/x86_64/lib64kdefakes5-4.4.5-0.4mdv2010.2.x86_64.rpm\n 2e682ce762d8a60cc4322370567b5f6c 2010.1/x86_64/lib64kdesu5-4.4.5-0.4mdv2010.2.x86_64.rpm\n acd07b647db525427550f6763b936a7a 2010.1/x86_64/lib64kdeui5-4.4.5-0.4mdv2010.2.x86_64.rpm\n 4fb64c5e05fb52b0b2c5eb1a92fdb3d1 2010.1/x86_64/lib64kdewebkit5-4.4.5-0.4mdv2010.2.x86_64.rpm\n 4176fd87a0b92f2ee7d088f3d4a774d0 2010.1/x86_64/lib64kdnssd4-4.4.5-0.4mdv2010.2.x86_64.rpm\n eed83cf3b32bd23a0b16fce8d2834e9d 2010.1/x86_64/lib64kfile4-4.4.5-0.4mdv2010.2.x86_64.rpm\n d66febf0bb7e273fb687c144a36ac138 2010.1/x86_64/lib64khtml5-4.4.5-0.4mdv2010.2.x86_64.rpm\n 174ac58c7dc86ee4458526b5a2480662 2010.1/x86_64/lib64kimproxy4-4.4.5-0.4mdv2010.2.x86_64.rpm\n b7c162555f547ae0d9edbf71bfe04f0d 2010.1/x86_64/lib64kio5-4.4.5-0.4mdv2010.2.x86_64.rpm\n 5d89a4e23e342dee305e2107bfdc8c0e 2010.1/x86_64/lib64kjs4-4.4.5-0.4mdv2010.2.x86_64.rpm\n d2df6f4275de4ff6407188ada2785094 2010.1/x86_64/lib64kjsapi4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 50ed7da9bcd068acb4819139eebb9026 2010.1/x86_64/lib64kjsembed4-4.4.5-0.4mdv2010.2.x86_64.rpm\n ad3c77de9a052f9b2612b15fb82be03f 2010.1/x86_64/lib64kmediaplayer4-4.4.5-0.4mdv2010.2.x86_64.rpm\n b9a8fbcdc54c359415075cf449ef6e4f 2010.1/x86_64/lib64knewstuff2_4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 6d6c9151d9a634ca423770e919179b50 2010.1/x86_64/lib64knewstuff34-4.4.5-0.4mdv2010.2.x86_64.rpm\n fe7c248a30318f755bd0fe1b11f98fe4 2010.1/x86_64/lib64knotifyconfig4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 888e7081a5be8ac0e1cbd7b47fd13ae7 2010.1/x86_64/lib64kntlm4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 5c5e89cc9cd02ebf9267b7ee5faf1278 2010.1/x86_64/lib64kparts4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 6c6bb95f61e8c26cc50902024303b3fe 2010.1/x86_64/lib64kpty4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 22d1c3f2d8345743f1d834ecccd069d4 2010.1/x86_64/lib64krosscore4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 502fb43a0a37496f2c11616d07fbbcbe 2010.1/x86_64/lib64krossui4-4.4.5-0.4mdv2010.2.x86_64.rpm\n d4fbf824ea3c54a902dc1e18e13756d0 2010.1/x86_64/lib64ktexteditor4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 927ed8af9b7e7c575c9e7984f4e80a89 2010.1/x86_64/lib64kunitconversion4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 12cd248453e3a3791de5f87f988eb430 2010.1/x86_64/lib64kunittest4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 2f9420a8dadfb08821bd911a3adb7b3f 2010.1/x86_64/lib64kutils4-4.4.5-0.4mdv2010.2.x86_64.rpm\n b9c9f1d4e0c8a51fd5d081b05b362def 2010.1/x86_64/lib64nepomuk4-4.4.5-0.4mdv2010.2.x86_64.rpm\n e80871c0e9b5b0c72a3ea2b2f86e64d1 2010.1/x86_64/lib64nepomukquery4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 29b23d3b31f4db91dc73f6a37ea02db1 2010.1/x86_64/lib64plasma3-4.4.5-0.4mdv2010.2.x86_64.rpm\n c2ba7f9a9f2202330a1c7bf46004f41d 2010.1/x86_64/lib64solid4-4.4.5-0.4mdv2010.2.x86_64.rpm\n 8a0ec353667253b3e3899c6980052999 2010.1/x86_64/lib64threadweaver4-4.4.5-0.4mdv2010.2.x86_64.rpm \n a3bd1963ad774911ef4d1902ce33aec9 2010.1/SRPMS/kdelibs4-4.4.5-0.4mdv2010.2.src.rpm\n\n Mandriva Linux 2011:\n 44421dc86e6c96eb9f4a1b835c40006d 2011/i586/kdelibs4-core-4.6.5-9.1-mdv2011.0.i586.rpm\n 31ef78219ce113dc91ba2d45ca166276 2011/i586/kdelibs4-devel-4.6.5-9.1-mdv2011.0.i586.rpm\n c72c7b24079aab97ce0923f5dd0bdf24 2011/i586/libkatepartinterfaces4-4.6.5-9.1-mdv2011.0.i586.rpm\n 882b577dc3c6a9b9f1c7872046cbffb4 2011/i586/libkcmutils4-4.6.5-9.1-mdv2011.0.i586.rpm\n b1cdc2769a17e075b43a2d1e49eb4efb 2011/i586/libkde3support4-4.6.5-9.1-mdv2011.0.i586.rpm\n 2aa0a579e90ea8b0015bcbccdeb4077e 2011/i586/libkdecore5-4.6.5-9.1-mdv2011.0.i586.rpm\n 105f203a2470d8d3aaf4381ba47f4a20 2011/i586/libkdefakes5-4.6.5-9.1-mdv2011.0.i586.rpm\n 3ad287cab02d774df12b8f5cedd2b7cb 2011/i586/libkdesu5-4.6.5-9.1-mdv2011.0.i586.rpm\n 4d4dcdf956ca0194bc2da5d901e14910 2011/i586/libkdeui5-4.6.5-9.1-mdv2011.0.i586.rpm\n c5d8b2ced514be22ff42c8a610dea367 2011/i586/libkdewebkit5-4.6.5-9.1-mdv2011.0.i586.rpm\n 89d3df52d5659ba172b5021aaa0800ba 2011/i586/libkdnssd4-4.6.5-9.1-mdv2011.0.i586.rpm\n 6f6e7b50cc22c4d0efec46ad85c52145 2011/i586/libkemoticons4-4.6.5-9.1-mdv2011.0.i586.rpm\n f9e7fb1a985fee36db209259643e3d43 2011/i586/libkfile4-4.6.5-9.1-mdv2011.0.i586.rpm\n ce0c07b3ab9ffb23074e3dcfd311251f 2011/i586/libkhtml5-4.6.5-9.1-mdv2011.0.i586.rpm\n 3e4bcd7edf1e6ddb2d2a75a563e83362 2011/i586/libkidletime4-4.6.5-9.1-mdv2011.0.i586.rpm\n bc4ad21bf5df0428897249edc07ee139 2011/i586/libkimproxy4-4.6.5-9.1-mdv2011.0.i586.rpm\n 86d9aa7a95e0b3c8c3736bced5030529 2011/i586/libkio5-4.6.5-9.1-mdv2011.0.i586.rpm\n 42894f5fef6b3955f4cc7cdc39a9b8b6 2011/i586/libkjs4-4.6.5-9.1-mdv2011.0.i586.rpm\n 5293f2f284c1df6466a84cfd33426b21 2011/i586/libkjsapi4-4.6.5-9.1-mdv2011.0.i586.rpm\n 600ac620222614c9240c56e35061dd5f 2011/i586/libkjsembed4-4.6.5-9.1-mdv2011.0.i586.rpm\n e6b032340b8f8b45f5e3dea24d4b795e 2011/i586/libkmediaplayer4-4.6.5-9.1-mdv2011.0.i586.rpm\n a9e4510933f71ee9354d41dc7f5c21f9 2011/i586/libknewstuff2_4-4.6.5-9.1-mdv2011.0.i586.rpm\n 4fffe4a09ab06dbb13e19ef552c765d3 2011/i586/libknewstuff3_4-4.6.5-9.1-mdv2011.0.i586.rpm\n 6176f21ff0870d298cad30f19cbc5985 2011/i586/libknotifyconfig4-4.6.5-9.1-mdv2011.0.i586.rpm\n aaca814c82291a16831052da452b072a 2011/i586/libkntlm4-4.6.5-9.1-mdv2011.0.i586.rpm\n 38441eea27e26fded337b55d1c7187b8 2011/i586/libkparts4-4.6.5-9.1-mdv2011.0.i586.rpm\n e1d9a6f2b3cf3546fffca8b3092b96d7 2011/i586/libkprintutils4-4.6.5-9.1-mdv2011.0.i586.rpm\n 78764e6b917983c8e337c69ac99d17f4 2011/i586/libkpty4-4.6.5-9.1-mdv2011.0.i586.rpm\n 8b727fc309bbb81de1d8ace536351303 2011/i586/libkrosscore4-4.6.5-9.1-mdv2011.0.i586.rpm\n 051aa118fdbcc20755754c2a4a45fdba 2011/i586/libkrossui4-4.6.5-9.1-mdv2011.0.i586.rpm\n c135b1698036881db6ab90cb448c265b 2011/i586/libktexteditor4-4.6.5-9.1-mdv2011.0.i586.rpm\n f7526412295bd86a3fdf26ad6bc8e962 2011/i586/libkunitconversion4-4.6.5-9.1-mdv2011.0.i586.rpm\n 603c837536ad6ca871ffe589c747c0f5 2011/i586/libkunittest4-4.6.5-9.1-mdv2011.0.i586.rpm\n e4c09f0fcb6f28bf768d337c62686eac 2011/i586/libkutils4-4.6.5-9.1-mdv2011.0.i586.rpm\n ac93402de1c9e45b65944aaeb8e425bf 2011/i586/libnepomuk4-4.6.5-9.1-mdv2011.0.i586.rpm\n ea8ba57a4f5e91529a074b3b5ddafb63 2011/i586/libnepomukquery4-4.6.5-9.1-mdv2011.0.i586.rpm\n a1ca1f682adaea8192cdf17082179790 2011/i586/libnepomukutils4-4.6.5-9.1-mdv2011.0.i586.rpm\n beb7c3df35c4208608541faba3e3cff1 2011/i586/libplasma3-4.6.5-9.1-mdv2011.0.i586.rpm\n 76cf8c65bc34fd9981ebd776fae7dd6b 2011/i586/libsolid4-4.6.5-9.1-mdv2011.0.i586.rpm\n 4dbe0bea09b0efcb77e4f97af52ee554 2011/i586/libthreadweaver4-4.6.5-9.1-mdv2011.0.i586.rpm \n 9cda5c5ab321d1d77cad4b273a8227a3 2011/SRPMS/kdelibs4-4.6.5-9.1.src.rpm\n\n Mandriva Linux 2011/X86_64:\n a416f173f6fee7f10e01e940622b03c7 2011/x86_64/kdelibs4-core-4.6.5-9.1-mdv2011.0.x86_64.rpm\n fdc8c171954de23a0161faec669953a3 2011/x86_64/kdelibs4-devel-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 389d42165fcb6c8853bda9f8fe352438 2011/x86_64/lib64katepartinterfaces4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 553e0d225fdc7335afd7571bc404b808 2011/x86_64/lib64kcmutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 1b073a351c1e5d2c350a908e361afde7 2011/x86_64/lib64kde3support4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 8a10b775f1dc843404e518eb1dd15263 2011/x86_64/lib64kdecore5-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 98b3c619dab6bcf91ebaea35dc59f24e 2011/x86_64/lib64kdefakes5-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 3035d04055ef41dc710a9a5cfa15f48f 2011/x86_64/lib64kdesu5-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 4bb1aade6cbc696aa298a0053a2778aa 2011/x86_64/lib64kdeui5-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 05593647a56638371c4b06f8eec04199 2011/x86_64/lib64kdewebkit5-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 9a61f92a25556635fdf01bd629079c05 2011/x86_64/lib64kdnssd4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n ebb20032192f17c4d8d46d7a117d6186 2011/x86_64/lib64kemoticons4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 7c16488a8271d8e0440f886a1e7a3e59 2011/x86_64/lib64kfile4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n f2b43f9f213e29c69f9bcf1fe30a0f91 2011/x86_64/lib64khtml5-4.6.5-9.1-mdv2011.0.x86_64.rpm\n e01dd3d898e30c921275e9e3fd7fe8a0 2011/x86_64/lib64kidletime4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n bf2a67810c9530f7d06584fe92a086cd 2011/x86_64/lib64kimproxy4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 3dc38dd2200e7765178b756d18355c5e 2011/x86_64/lib64kio5-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 479d0258813eb4ce2112efa290ac992f 2011/x86_64/lib64kjs4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 5821bd4cb36e6ae484fed3f3b178f64c 2011/x86_64/lib64kjsapi4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 97d0a7073257b5d38ebd89608b230cb2 2011/x86_64/lib64kjsembed4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n b8201d7c86d380f53a747569c86cc125 2011/x86_64/lib64kmediaplayer4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n a7470e5a2f9f1c2802a70386d94734d9 2011/x86_64/lib64knewstuff2_4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n d10cff1d4ae24594f65017681b351aa4 2011/x86_64/lib64knewstuff3_4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 40625fb25f84a66747bfdb5e8c33397f 2011/x86_64/lib64knotifyconfig4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 7a58f4dad0d080ad1bb4f9d0b7b55721 2011/x86_64/lib64kntlm4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 216f06e8c9bc940a7c1bc96c0be60c85 2011/x86_64/lib64kparts4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n d2bf6a48431bfa87b20274b6a916ed07 2011/x86_64/lib64kprintutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 17e748ccf383dcd76bf54370bae5b60b 2011/x86_64/lib64kpty4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 2980ae5e1eb2df517b9ac30f815e2b86 2011/x86_64/lib64krosscore4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n a3daeac9197c566f3112a0efc2a20440 2011/x86_64/lib64krossui4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 0eb6aa884c8725aa2cc7cc5947f10fce 2011/x86_64/lib64ktexteditor4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n e58f316e4fe7ec5412c6f24b263f61d8 2011/x86_64/lib64kunitconversion4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n a07e9a42d9d34450fcdaa4a81fee7e1b 2011/x86_64/lib64kunittest4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 34610271f7de5ba3c6226d857831162f 2011/x86_64/lib64kutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n ddf3eb523f5b29dd49b937b63d3efce7 2011/x86_64/lib64nepomuk4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n eacd8f03c285571b4724f93b4f80525c 2011/x86_64/lib64nepomukquery4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 9fc98f8e2958ad971b73a887ecc25d75 2011/x86_64/lib64nepomukutils4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n b66922bbe21ba37ab38a362eb279b399 2011/x86_64/lib64plasma3-4.6.5-9.1-mdv2011.0.x86_64.rpm\n 412dee5f9cbf514d0cc8e7b6c4bb7036 2011/x86_64/lib64solid4-4.6.5-9.1-mdv2011.0.x86_64.rpm\n ed8eb7bd7d026d75615bda14538fe6af 2011/x86_64/lib64threadweaver4-4.6.5-9.1-mdv2011.0.x86_64.rpm \n 9cda5c5ab321d1d77cad4b273a8227a3 2011/SRPMS/kdelibs4-4.6.5-9.1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niD8DBQFOr+brmqjQ0CJFipgRApQNAKDVWJ591FTnmPG9EY+uaQ0yn+SKfwCg2PkW\nN0/0RYLF0JoU7ErOvYOPwxA=\n=+mKq\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. The\nCommon Vulnerabilities and Exposures project identifies the following\nproblems:\n\nCVE-2009-2408\n\nDan Kaminsky and Moxie Marlinspike discovered that icedove does not\nproperly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s\nCommon Name (CN) field of an X.509 certificate (MFSA 2009-42). \n\nCVE-2009-2404\n\nMoxie Marlinspike reported a heap overflow vulnerability in the code\nthat handles regular expressions in certificate names (MFSA 2009-43). \n\nCVE-2009-2463\n\nmonarch2020 discovered an integer overflow n a base64 decoding function\n(MFSA 2010-07). \n\nCVE-2009-3072\n\nJosh Soref discovered a crash in the BinHex decoder (MFSA 2010-07). \n\nCVE-2009-3075\n\nCarsten Book reported a crash in the JavaScript engine (MFSA 2010-07). \n\nCVE-2010-0163\n\nLudovic Hirlimann reported a crash indexing some messages with\nattachments, which could lead to the execution of arbitrary code\n(MFSA 2010-07). \n\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 2.0.0.24-0lenny1. \n\nDue to a problem with the archive system it is not possible to release\nall architectures. The missing architectures will be installed into the\narchive once they become available. \n\nFor the testing distribution squeeze and the unstable distribution (sid),\nthese problems will be fixed soon. \n\n\nWe recommend that you upgrade your icedove packages. \n\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24.orig.tar.gz\n Size/MD5 checksum: 35856543 3bf6e40cddf593ddc1a66b9e721f12b9\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.dsc\n Size/MD5 checksum: 1668 111c1a93c1ce498715e231272123f841\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.diff.gz\n Size/MD5 checksum: 103260 4661b0c8c170d58f844337699cb8ca1a\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_alpha.deb\n Size/MD5 checksum: 3723382 12c7fe63b0a5c59680ca36200a6f7d20\n http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_alpha.deb\n Size/MD5 checksum: 61132 c0f96569d4ea0f01cff3950572b3dda9\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_alpha.deb\n Size/MD5 checksum: 57375560 95a614e1cb620fad510eb51ae5cb37c5\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_alpha.deb\n Size/MD5 checksum: 13468190 03a629abf18130605927f5817b097bac\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_amd64.deb\n Size/MD5 checksum: 57584134 7d909c9f1b67d4758e290dc2c1dc01f2\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_amd64.deb\n Size/MD5 checksum: 3937168 de9dda16f94e696de897bec6c8d45f90\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_amd64.deb\n Size/MD5 checksum: 12384488 8d1632f7511c711a1d2ea940f7e451a2\n http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_amd64.deb\n Size/MD5 checksum: 59114 fae947071c0de6ebce316decbce61f9a\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_arm.deb\n Size/MD5 checksum: 3929902 5ab6f673b34770278270fb7862986b0b\n http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_arm.deb\n Size/MD5 checksum: 53746 c9c53e8a42d85fe5f4fa8e2a85e55629\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_arm.deb\n Size/MD5 checksum: 56491578 8eb38c6f99c501556506ac6790833941\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_arm.deb\n Size/MD5 checksum: 10943350 d7c0badfe9210ce5341eb17ab7e71ca2\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_hppa.deb\n Size/MD5 checksum: 3944678 2a9dc50b61420b4fdf8f3a4d378bb484\n http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_hppa.deb\n Size/MD5 checksum: 60554 7dcd739363cff3cc4bda659b82856536\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_hppa.deb\n Size/MD5 checksum: 58523174 6780e8f9de0f2ed0c3bd533d03853d85\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_hppa.deb\n Size/MD5 checksum: 13952170 88674f31191b07cd76ea5d366c545f1d\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_i386.deb\n Size/MD5 checksum: 10951904 52ce1587c6eb95b7f8b63ccedf224d88\n http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_i386.deb\n Size/MD5 checksum: 54838 101de9e837bea9391461074481bf770f\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_i386.deb\n Size/MD5 checksum: 3924810 6ecf3693cce2ae97fd0bbdafc1ff06f6\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_i386.deb\n Size/MD5 checksum: 56543048 73d1684cf69bed0441393abb46610433\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_ia64.deb\n Size/MD5 checksum: 3756914 615afd30bf893d2d32bbacedf1f7ff8e\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_ia64.deb\n Size/MD5 checksum: 16545566 0444c7198e94ab59e103e60bf86a2aa2\n http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_ia64.deb\n Size/MD5 checksum: 66302 f8800140b3797d4a4267a5dac0043995\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_ia64.deb\n Size/MD5 checksum: 57199564 5df5808f91ecdf6ac49f0e922b1a0234\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_powerpc.deb\n Size/MD5 checksum: 12112586 4b40106b68670c726624348c0cb8bd1f\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_powerpc.deb\n Size/MD5 checksum: 59511730 226cdd43af9dffb4132002044120769c\n http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_powerpc.deb\n Size/MD5 checksum: 56670 72e58731ac68f2c599704a3e7ca45d4c\n http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_powerpc.deb\n Size/MD5 checksum: 3942470 e8454d41a095226a2d252f10da795d96\n\n\n These files will probably be moved into the stable distribution on\n its next update. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -----------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2010-0001\nSynopsis: ESX Service Console updates for nss and nspr\nIssue date: 2010-01-06\nUpdated on: 2010-01-06 (initial release of advisory)\nCVE numbers: CVE-2009-2409 CVE-2009-2408 CVE-2009-2404\n CVE-2009-1563 CVE-2009-3274 CVE-2009-3370\n CVE-2009-3372 CVE-2009-3373 CVE-2009-3374\n CVE-2009-3375 CVE-2009-3376 CVE-2009-3380\n CVE-2009-3382\n- -----------------------------------------------------------------------\n1. Summary\n\n Update for Service Console packages nss and nspr\n\n2. Relevant releases\n\n VMware ESX 4.0 without patch ESX400-200912403-SG\n\n3. Problem Description\n\n a. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the names CVE-2009-2409, CVE-2009-2408, CVE-2009-2404,\n CVE-2009-1563, CVE-2009-3274, CVE-2009-3370, CVE-2009-3372,\n CVE-2009-3373, CVE-2009-3374, CVE-2009-3375, CVE-2009-3376,\n CVE-2009-3380, and CVE-2009-3382 to these issues. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-200912403-SG\n ESX 3.5 ESX not affected\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX not affected\n ESX 2.5.5 ESX not affected\n\n vMA 4.0 RHEL5 affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n ESX 4.0\n -------\n ESX400-200912403-SG\n\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-181-20091231-153046/ESX400-200912001.zip\n md5sum: 78c6cf139b7941dc736c9d3a41deae77\n sha1sum: 36df3a675fbd3c8c8830f00637e37ee716bdac59\n http://kb.vmware.com/kb/1016293\n\n To install an individual bulletin use esxupdate with the -b option. \n esxupdate --bundle=ESX400-200912001.zip -b ESX400-200912403-SG\n update\n\n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3382\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2010-01-06 VMSA-2010-0001\nInitial security advisory after release of patch ESX400-200912403-SG\nfor ESX 4.0 on 2010-01-06. \n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2010 VMware Inc. All rights reserved. \n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (MingW32)\n\niD8DBQFLRYwLS2KysvBH1xkRArmBAJoDcO5waCyCE+lfmEwuILVjcqeLngCcCzNo\nHgNlBjOx5iQw7etlwwpbyuo=\n=bIJJ\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201301-01\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Mozilla Products: Multiple vulnerabilities\n Date: January 08, 2013\n Bugs: #180159, #181361, #207261, #238535, #246602, #251322,\n #255221, #255234, #255687, #257577, #260062, #261386,\n #262704, #267234, #273918, #277752, #280226, #280234,\n #280393, #282549, #284439, #286721, #290892, #292034,\n #297532, #305689, #307045, #311021, #312361, #312645,\n #312651, #312675, #312679, #312763, #313003, #324735,\n #326341, #329279, #336396, #341821, #342847, #348316,\n #357057, #360055, #360315, #365323, #373595, #379549,\n #381245, #388045, #390771, #395431, #401701, #403183,\n #404437, #408161, #413657, #419917, #427224, #433383,\n #437780, #439586, #439960, #444318\n ID: 201301-01\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Mozilla Firefox,\nThunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which\nmay allow execution of arbitrary code or local privilege escalation. \n\nBackground\n==========\n\nMozilla Firefox is an open-source web browser and Mozilla Thunderbird\nan open-source email client, both from the Mozilla Project. The\nSeaMonkey project is a community effort to deliver production-quality\nreleases of code derived from the application formerly known as the\n\u0027Mozilla Application Suite\u0027. XULRunner is a Mozilla runtime package\nthat can be used to bootstrap XUL+XPCOM applications such as Firefox\nand Thunderbird. NSS is Mozilla\u0027s Network Security Services library\nthat implements PKI support. IceCat is the GNU version of Firefox. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-client/firefox \u003c 10.0.11 \u003e= 10.0.11\n 2 www-client/firefox-bin \u003c 10.0.11 \u003e= 10.0.11\n 3 mail-client/thunderbird \u003c 10.0.11 \u003e= 10.0.11\n 4 mail-client/thunderbird-bin\n \u003c 10.0.11 \u003e= 10.0.11\n 5 www-client/seamonkey \u003c 2.14-r1 \u003e= 2.14-r1\n 6 www-client/seamonkey-bin\n \u003c 2.14 \u003e= 2.14\n 7 dev-libs/nss \u003c 3.14 \u003e= 3.14\n 8 www-client/mozilla-firefox\n \u003c= 3.6.8 Vulnerable!\n 9 www-client/mozilla-firefox-bin\n \u003c= 3.5.6 Vulnerable!\n 10 mail-client/mozilla-thunderbird\n \u003c= 3.0.4-r1 Vulnerable!\n 11 mail-client/mozilla-thunderbird-bin\n \u003c= 3.0 Vulnerable!\n 12 www-client/icecat \u003c= 10.0-r1 Vulnerable!\n 13 net-libs/xulrunner \u003c= 2.0-r1 Vulnerable!\n 14 net-libs/xulrunner-bin \u003c= 1.8.1.19 Vulnerable!\n -------------------------------------------------------------------\n NOTE: Certain packages are still vulnerable. Users should migrate\n to another package if one is available or wait for the\n existing packages to be marked stable by their\n architecture maintainers. \n -------------------------------------------------------------------\n 14 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Mozilla Firefox,\nThunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker could entice a user to view a specially crafted web\npage or email, possibly resulting in execution of arbitrary code or a\nDenial of Service condition. Furthermore, a remote attacker may be able\nto perform Man-in-the-Middle attacks, obtain sensitive information,\nbypass restrictions and protection mechanisms, force file downloads,\nconduct XML injection attacks, conduct XSS attacks, bypass the Same\nOrigin Policy, spoof URL\u0027s for phishing attacks, trigger a vertical\nscroll, spoof the location bar, spoof an SSL indicator, modify the\nbrowser\u0027s font, conduct clickjacking attacks, or have other unspecified\nimpact. \n\nA local attacker could gain escalated privileges, obtain sensitive\ninformation, or replace an arbitrary downloaded file. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Mozilla Firefox users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-client/firefox-10.0.11\"\n\nAll users of the Mozilla Firefox binary package should upgrade to the\nlatest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-client/firefox-bin-10.0.11\"=\n\n\nAll Mozilla Thunderbird users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=mail-client/thunderbird-10.0.11\"\n\nAll users of the Mozilla Thunderbird binary package should upgrade to\nthe latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=mail-client/thunderbird-bin-10.0.11\"\n\nAll Mozilla SeaMonkey users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-client/seamonkey-2.14-r1\"\n\nAll users of the Mozilla SeaMonkey binary package should upgrade to the\nlatest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-client/seamonkey-bin-2.14\"\n\nAll NSS users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/nss-3.14\"\n\nThe \"www-client/mozilla-firefox\" package has been merged into the\n\"www-client/firefox\" package. To upgrade, please unmerge\n\"www-client/mozilla-firefox\" and then emerge the latest\n\"www-client/firefox\" package:\n\n # emerge --sync\n # emerge --unmerge \"www-client/mozilla-firefox\"\n # emerge --ask --oneshot --verbose \"\u003e=www-client/firefox-10.0.11\"\n\nThe \"www-client/mozilla-firefox-bin\" package has been merged into the\n\"www-client/firefox-bin\" package. To upgrade, please unmerge\n\"www-client/mozilla-firefox-bin\" and then emerge the latest\n\"www-client/firefox-bin\" package:\n\n # emerge --sync\n # emerge --unmerge \"www-client/mozilla-firefox-bin\"\n # emerge --ask --oneshot --verbose \"\u003e=www-client/firefox-bin-10.0.11\"=\n\n\nThe \"mail-client/mozilla-thunderbird\" package has been merged into the\n\"mail-client/thunderbird\" package. To upgrade, please unmerge\n\"mail-client/mozilla-thunderbird\" and then emerge the latest\n\"mail-client/thunderbird\" package:\n\n # emerge --sync\n # emerge --unmerge \"mail-client/mozilla-thunderbird\"\n # emerge --ask --oneshot -v \"\u003e=mail-client/thunderbird-10.0.11\"\n\nThe \"mail-client/mozilla-thunderbird-bin\" package has been merged into\nthe \"mail-client/thunderbird-bin\" package. To upgrade, please unmerge\n\"mail-client/mozilla-thunderbird-bin\" and then emerge the latest\n\"mail-client/thunderbird-bin\" package:\n\n # emerge --sync\n # emerge --unmerge \"mail-client/mozilla-thunderbird-bin\"\n # emerge --ask --oneshot -v \"\u003e=mail-client/thunderbird-bin-10.0.11\"\n\nGentoo discontinued support for GNU IceCat. We recommend that users\nunmerge GNU IceCat:\n\n # emerge --unmerge \"www-client/icecat\"\n\nGentoo discontinued support for XULRunner. We recommend that users\nunmerge XULRunner:\n\n # emerge --unmerge \"net-libs/xulrunner\"\n\nGentoo discontinued support for the XULRunner binary package. We\nrecommend that users unmerge XULRunner:\n\n # emerge --unmerge \"net-libs/xulrunner-bin\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-3101\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3101\n[ 2 ] CVE-2007-2436\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2436\n[ 3 ] CVE-2007-2437\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2437\n[ 4 ] CVE-2007-2671\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2671\n[ 5 ] CVE-2007-3073\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3073\n[ 6 ] CVE-2008-0016\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0016\n[ 7 ] CVE-2008-0017\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0017\n[ 8 ] CVE-2008-0367\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0367\n[ 9 ] CVE-2008-3835\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3835\n[ 10 ] CVE-2008-3836\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3836\n[ 11 ] CVE-2008-3837\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3837\n[ 12 ] CVE-2008-4058\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4058\n[ 13 ] CVE-2008-4059\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4059\n[ 14 ] CVE-2008-4060\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4060\n[ 15 ] CVE-2008-4061\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4061\n[ 16 ] CVE-2008-4062\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4062\n[ 17 ] CVE-2008-4063\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4063\n[ 18 ] CVE-2008-4064\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4064\n[ 19 ] CVE-2008-4065\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4065\n[ 20 ] CVE-2008-4066\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4066\n[ 21 ] CVE-2008-4067\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4067\n[ 22 ] CVE-2008-4068\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4068\n[ 23 ] CVE-2008-4069\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4069\n[ 24 ] CVE-2008-4070\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4070\n[ 25 ] CVE-2008-4582\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4582\n[ 26 ] CVE-2008-5012\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5012\n[ 27 ] CVE-2008-5013\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5013\n[ 28 ] CVE-2008-5014\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5014\n[ 29 ] CVE-2008-5015\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5015\n[ 30 ] CVE-2008-5016\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5016\n[ 31 ] CVE-2008-5017\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5017\n[ 32 ] CVE-2008-5018\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5018\n[ 33 ] CVE-2008-5019\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5019\n[ 34 ] CVE-2008-5021\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5021\n[ 35 ] CVE-2008-5022\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5022\n[ 36 ] CVE-2008-5023\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5023\n[ 37 ] CVE-2008-5024\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5024\n[ 38 ] CVE-2008-5052\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5052\n[ 39 ] CVE-2008-5500\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5500\n[ 40 ] CVE-2008-5501\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5501\n[ 41 ] CVE-2008-5502\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5502\n[ 42 ] CVE-2008-5503\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5503\n[ 43 ] CVE-2008-5504\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5504\n[ 44 ] CVE-2008-5505\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5505\n[ 45 ] CVE-2008-5506\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5506\n[ 46 ] CVE-2008-5507\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5507\n[ 47 ] CVE-2008-5508\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5508\n[ 48 ] CVE-2008-5510\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5510\n[ 49 ] CVE-2008-5511\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5511\n[ 50 ] CVE-2008-5512\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5512\n[ 51 ] CVE-2008-5513\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5513\n[ 52 ] CVE-2008-5822\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5822\n[ 53 ] CVE-2008-5913\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5913\n[ 54 ] CVE-2008-6961\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6961\n[ 55 ] CVE-2009-0071\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071\n[ 56 ] CVE-2009-0071\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071\n[ 57 ] CVE-2009-0352\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0352\n[ 58 ] CVE-2009-0353\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0353\n[ 59 ] CVE-2009-0354\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0354\n[ 60 ] CVE-2009-0355\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0355\n[ 61 ] CVE-2009-0356\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0356\n[ 62 ] CVE-2009-0357\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0357\n[ 63 ] CVE-2009-0358\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0358\n[ 64 ] CVE-2009-0652\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0652\n[ 65 ] CVE-2009-0771\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0771\n[ 66 ] CVE-2009-0772\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0772\n[ 67 ] CVE-2009-0773\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0773\n[ 68 ] CVE-2009-0774\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0774\n[ 69 ] CVE-2009-0775\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0775\n[ 70 ] CVE-2009-0776\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0776\n[ 71 ] CVE-2009-0777\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0777\n[ 72 ] CVE-2009-1044\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1044\n[ 73 ] CVE-2009-1169\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1169\n[ 74 ] CVE-2009-1302\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1302\n[ 75 ] CVE-2009-1303\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1303\n[ 76 ] CVE-2009-1304\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1304\n[ 77 ] CVE-2009-1305\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1305\n[ 78 ] CVE-2009-1306\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1306\n[ 79 ] CVE-2009-1307\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1307\n[ 80 ] CVE-2009-1308\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1308\n[ 81 ] CVE-2009-1309\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1309\n[ 82 ] CVE-2009-1310\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1310\n[ 83 ] CVE-2009-1311\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1311\n[ 84 ] CVE-2009-1312\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1312\n[ 85 ] CVE-2009-1313\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1313\n[ 86 ] CVE-2009-1392\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1392\n[ 87 ] CVE-2009-1563\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1563\n[ 88 ] CVE-2009-1571\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1571\n[ 89 ] CVE-2009-1828\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1828\n[ 90 ] CVE-2009-1832\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1832\n[ 91 ] CVE-2009-1833\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1833\n[ 92 ] CVE-2009-1834\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1834\n[ 93 ] CVE-2009-1835\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1835\n[ 94 ] CVE-2009-1836\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1836\n[ 95 ] CVE-2009-1837\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1837\n[ 96 ] CVE-2009-1838\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1838\n[ 97 ] CVE-2009-1839\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1839\n[ 98 ] CVE-2009-1840\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1840\n[ 99 ] CVE-2009-1841\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1841\n[ 100 ] CVE-2009-2043\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2043\n[ 101 ] CVE-2009-2044\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2044\n[ 102 ] CVE-2009-2061\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2061\n[ 103 ] CVE-2009-2065\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2065\n[ 104 ] CVE-2009-2210\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2210\n[ 105 ] CVE-2009-2404\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2404\n[ 106 ] CVE-2009-2408\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2408\n[ 107 ] CVE-2009-2462\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2462\n[ 108 ] CVE-2009-2463\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2463\n[ 109 ] CVE-2009-2464\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2464\n[ 110 ] CVE-2009-2465\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2465\n[ 111 ] CVE-2009-2466\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2466\n[ 112 ] CVE-2009-2467\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2467\n[ 113 ] CVE-2009-2469\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2469\n[ 114 ] CVE-2009-2470\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2470\n[ 115 ] CVE-2009-2471\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2471\n[ 116 ] CVE-2009-2472\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2472\n[ 117 ] CVE-2009-2477\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2477\n[ 118 ] CVE-2009-2478\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2478\n[ 119 ] CVE-2009-2479\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2479\n[ 120 ] CVE-2009-2535\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2535\n[ 121 ] CVE-2009-2654\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2654\n[ 122 ] CVE-2009-2662\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2662\n[ 123 ] CVE-2009-2664\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2664\n[ 124 ] CVE-2009-2665\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2665\n[ 125 ] CVE-2009-3069\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3069\n[ 126 ] CVE-2009-3070\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3070\n[ 127 ] CVE-2009-3071\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3071\n[ 128 ] CVE-2009-3072\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3072\n[ 129 ] CVE-2009-3074\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3074\n[ 130 ] CVE-2009-3075\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3075\n[ 131 ] CVE-2009-3076\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3076\n[ 132 ] CVE-2009-3077\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3077\n[ 133 ] CVE-2009-3078\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3078\n[ 134 ] CVE-2009-3079\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3079\n[ 135 ] CVE-2009-3274\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3274\n[ 136 ] CVE-2009-3371\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3371\n[ 137 ] CVE-2009-3372\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3372\n[ 138 ] CVE-2009-3373\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3373\n[ 139 ] CVE-2009-3374\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3374\n[ 140 ] CVE-2009-3375\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3375\n[ 141 ] CVE-2009-3376\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3376\n[ 142 ] CVE-2009-3377\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3377\n[ 143 ] CVE-2009-3378\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3378\n[ 144 ] CVE-2009-3379\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3379\n[ 145 ] CVE-2009-3380\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3380\n[ 146 ] CVE-2009-3381\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3381\n[ 147 ] CVE-2009-3382\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3382\n[ 148 ] CVE-2009-3383\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3383\n[ 149 ] CVE-2009-3388\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388\n[ 150 ] CVE-2009-3389\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389\n[ 151 ] CVE-2009-3555\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555\n[ 152 ] CVE-2009-3978\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3978\n[ 153 ] CVE-2009-3979\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979\n[ 154 ] CVE-2009-3980\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3980\n[ 155 ] CVE-2009-3981\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3981\n[ 156 ] CVE-2009-3982\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982\n[ 157 ] CVE-2009-3983\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983\n[ 158 ] CVE-2009-3984\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984\n[ 159 ] CVE-2009-3985\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985\n[ 160 ] CVE-2009-3986\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986\n[ 161 ] CVE-2009-3987\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987\n[ 162 ] CVE-2009-3988\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3988\n[ 163 ] CVE-2010-0159\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0159\n[ 164 ] CVE-2010-0160\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0160\n[ 165 ] CVE-2010-0162\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0162\n[ 166 ] CVE-2010-0163\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0163\n[ 167 ] CVE-2010-0164\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0164\n[ 168 ] CVE-2010-0165\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0165\n[ 169 ] CVE-2010-0166\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0166\n[ 170 ] CVE-2010-0167\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167\n[ 171 ] CVE-2010-0167\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167\n[ 172 ] CVE-2010-0168\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0168\n[ 173 ] CVE-2010-0169\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169\n[ 174 ] CVE-2010-0169\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169\n[ 175 ] CVE-2010-0170\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0170\n[ 176 ] CVE-2010-0171\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171\n[ 177 ] CVE-2010-0171\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171\n[ 178 ] CVE-2010-0172\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0172\n[ 179 ] CVE-2010-0173\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0173\n[ 180 ] CVE-2010-0174\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174\n[ 181 ] CVE-2010-0174\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174\n[ 182 ] CVE-2010-0175\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175\n[ 183 ] CVE-2010-0175\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175\n[ 184 ] CVE-2010-0176\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176\n[ 185 ] CVE-2010-0176\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176\n[ 186 ] CVE-2010-0177\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0177\n[ 187 ] CVE-2010-0178\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0178\n[ 188 ] CVE-2010-0179\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0179\n[ 189 ] CVE-2010-0181\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0181\n[ 190 ] CVE-2010-0182\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0182\n[ 191 ] CVE-2010-0183\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0183\n[ 192 ] CVE-2010-0220\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0220\n[ 193 ] CVE-2010-0648\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0648\n[ 194 ] CVE-2010-0654\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0654\n[ 195 ] CVE-2010-1028\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1028\n[ 196 ] CVE-2010-1121\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1121\n[ 197 ] CVE-2010-1125\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1125\n[ 198 ] CVE-2010-1196\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1196\n[ 199 ] CVE-2010-1197\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1197\n[ 200 ] CVE-2010-1198\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1198\n[ 201 ] CVE-2010-1199\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1199\n[ 202 ] CVE-2010-1200\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1200\n[ 203 ] CVE-2010-1201\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1201\n[ 204 ] CVE-2010-1202\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1202\n[ 205 ] CVE-2010-1203\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1203\n[ 206 ] CVE-2010-1205\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205\n[ 207 ] CVE-2010-1206\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1206\n[ 208 ] CVE-2010-1207\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1207\n[ 209 ] CVE-2010-1208\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1208\n[ 210 ] CVE-2010-1209\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1209\n[ 211 ] CVE-2010-1210\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1210\n[ 212 ] CVE-2010-1211\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1211\n[ 213 ] CVE-2010-1212\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1212\n[ 214 ] CVE-2010-1213\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1213\n[ 215 ] CVE-2010-1214\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1214\n[ 216 ] CVE-2010-1215\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1215\n[ 217 ] CVE-2010-1585\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1585\n[ 218 ] CVE-2010-2751\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2751\n[ 219 ] CVE-2010-2752\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2752\n[ 220 ] CVE-2010-2753\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2753\n[ 221 ] CVE-2010-2754\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2754\n[ 222 ] CVE-2010-2755\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2755\n[ 223 ] CVE-2010-2760\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2760\n[ 224 ] CVE-2010-2762\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2762\n[ 225 ] CVE-2010-2763\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2763\n[ 226 ] CVE-2010-2764\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2764\n[ 227 ] CVE-2010-2765\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2765\n[ 228 ] CVE-2010-2766\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2766\n[ 229 ] CVE-2010-2767\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2767\n[ 230 ] CVE-2010-2768\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2768\n[ 231 ] CVE-2010-2769\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2769\n[ 232 ] CVE-2010-2770\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2770\n[ 233 ] CVE-2010-3131\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3131\n[ 234 ] CVE-2010-3166\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3166\n[ 235 ] CVE-2010-3167\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3167\n[ 236 ] CVE-2010-3168\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3168\n[ 237 ] CVE-2010-3169\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3169\n[ 238 ] CVE-2010-3170\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3170\n[ 239 ] CVE-2010-3171\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3171\n[ 240 ] CVE-2010-3173\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3173\n[ 241 ] CVE-2010-3174\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3174\n[ 242 ] CVE-2010-3175\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3175\n[ 243 ] CVE-2010-3176\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3176\n[ 244 ] CVE-2010-3177\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3177\n[ 245 ] CVE-2010-3178\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3178\n[ 246 ] CVE-2010-3179\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3179\n[ 247 ] CVE-2010-3180\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3180\n[ 248 ] CVE-2010-3182\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3182\n[ 249 ] CVE-2010-3183\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3183\n[ 250 ] CVE-2010-3399\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3399\n[ 251 ] CVE-2010-3400\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3400\n[ 252 ] CVE-2010-3765\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3765\n[ 253 ] CVE-2010-3766\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3766\n[ 254 ] CVE-2010-3767\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3767\n[ 255 ] CVE-2010-3768\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3768\n[ 256 ] CVE-2010-3769\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3769\n[ 257 ] CVE-2010-3770\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3770\n[ 258 ] CVE-2010-3771\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3771\n[ 259 ] CVE-2010-3772\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3772\n[ 260 ] CVE-2010-3773\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3773\n[ 261 ] CVE-2010-3774\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3774\n[ 262 ] CVE-2010-3775\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3775\n[ 263 ] CVE-2010-3776\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3776\n[ 264 ] CVE-2010-3777\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3777\n[ 265 ] CVE-2010-3778\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3778\n[ 266 ] CVE-2010-4508\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4508\n[ 267 ] CVE-2010-5074\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5074\n[ 268 ] CVE-2011-0051\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0051\n[ 269 ] CVE-2011-0053\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0053\n[ 270 ] CVE-2011-0054\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0054\n[ 271 ] CVE-2011-0055\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0055\n[ 272 ] CVE-2011-0056\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0056\n[ 273 ] CVE-2011-0057\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0057\n[ 274 ] CVE-2011-0058\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0058\n[ 275 ] CVE-2011-0059\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0059\n[ 276 ] CVE-2011-0061\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0061\n[ 277 ] CVE-2011-0062\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0062\n[ 278 ] CVE-2011-0065\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0065\n[ 279 ] CVE-2011-0066\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0066\n[ 280 ] CVE-2011-0067\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0067\n[ 281 ] CVE-2011-0068\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0068\n[ 282 ] CVE-2011-0069\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0069\n[ 283 ] CVE-2011-0070\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0070\n[ 284 ] CVE-2011-0071\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0071\n[ 285 ] CVE-2011-0072\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0072\n[ 286 ] CVE-2011-0073\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0073\n[ 287 ] CVE-2011-0074\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0074\n[ 288 ] CVE-2011-0075\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0075\n[ 289 ] CVE-2011-0076\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0076\n[ 290 ] CVE-2011-0077\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0077\n[ 291 ] CVE-2011-0078\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0078\n[ 292 ] CVE-2011-0079\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0079\n[ 293 ] CVE-2011-0080\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0080\n[ 294 ] CVE-2011-0081\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0081\n[ 295 ] CVE-2011-0082\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0082\n[ 296 ] CVE-2011-0083\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0083\n[ 297 ] CVE-2011-0084\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0084\n[ 298 ] CVE-2011-0085\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0085\n[ 299 ] CVE-2011-1187\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1187\n[ 300 ] CVE-2011-1202\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1202\n[ 301 ] CVE-2011-1712\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1712\n[ 302 ] CVE-2011-2362\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2362\n[ 303 ] CVE-2011-2363\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2363\n[ 304 ] CVE-2011-2364\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2364\n[ 305 ] CVE-2011-2365\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2365\n[ 306 ] CVE-2011-2369\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2369\n[ 307 ] CVE-2011-2370\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2370\n[ 308 ] CVE-2011-2371\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2371\n[ 309 ] CVE-2011-2372\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2372\n[ 310 ] CVE-2011-2373\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2373\n[ 311 ] CVE-2011-2374\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2374\n[ 312 ] CVE-2011-2375\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2375\n[ 313 ] CVE-2011-2376\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2376\n[ 314 ] CVE-2011-2377\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2377\n[ 315 ] CVE-2011-2378\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2378\n[ 316 ] CVE-2011-2605\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2605\n[ 317 ] CVE-2011-2980\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2980\n[ 318 ] CVE-2011-2981\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2981\n[ 319 ] CVE-2011-2982\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2982\n[ 320 ] CVE-2011-2983\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2983\n[ 321 ] CVE-2011-2984\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2984\n[ 322 ] CVE-2011-2985\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2985\n[ 323 ] CVE-2011-2986\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2986\n[ 324 ] CVE-2011-2987\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2987\n[ 325 ] CVE-2011-2988\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2988\n[ 326 ] CVE-2011-2989\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2989\n[ 327 ] CVE-2011-2990\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2990\n[ 328 ] CVE-2011-2991\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2991\n[ 329 ] CVE-2011-2993\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2993\n[ 330 ] CVE-2011-2995\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2995\n[ 331 ] CVE-2011-2996\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2996\n[ 332 ] CVE-2011-2997\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2997\n[ 333 ] CVE-2011-2998\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2998\n[ 334 ] CVE-2011-2999\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2999\n[ 335 ] CVE-2011-3000\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3000\n[ 336 ] CVE-2011-3001\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3001\n[ 337 ] CVE-2011-3002\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3002\n[ 338 ] CVE-2011-3003\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3003\n[ 339 ] CVE-2011-3004\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3004\n[ 340 ] CVE-2011-3005\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3005\n[ 341 ] CVE-2011-3026\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026\n[ 342 ] CVE-2011-3062\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3062\n[ 343 ] CVE-2011-3232\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3232\n[ 344 ] CVE-2011-3389\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389\n[ 345 ] CVE-2011-3640\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3640\n[ 346 ] CVE-2011-3647\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3647\n[ 347 ] CVE-2011-3648\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3648\n[ 348 ] CVE-2011-3649\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3649\n[ 349 ] CVE-2011-3650\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3650\n[ 350 ] CVE-2011-3651\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3651\n[ 351 ] CVE-2011-3652\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3652\n[ 352 ] CVE-2011-3653\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3653\n[ 353 ] CVE-2011-3654\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3654\n[ 354 ] CVE-2011-3655\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3655\n[ 355 ] CVE-2011-3658\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3658\n[ 356 ] CVE-2011-3659\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3659\n[ 357 ] CVE-2011-3660\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3660\n[ 358 ] CVE-2011-3661\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3661\n[ 359 ] CVE-2011-3663\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3663\n[ 360 ] CVE-2011-3665\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3665\n[ 361 ] CVE-2011-3670\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3670\n[ 362 ] CVE-2011-3866\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3866\n[ 363 ] CVE-2011-4688\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4688\n[ 364 ] CVE-2012-0441\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0441\n[ 365 ] CVE-2012-0442\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0442\n[ 366 ] CVE-2012-0443\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0443\n[ 367 ] CVE-2012-0444\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0444\n[ 368 ] CVE-2012-0445\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0445\n[ 369 ] CVE-2012-0446\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0446\n[ 370 ] CVE-2012-0447\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0447\n[ 371 ] CVE-2012-0449\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0449\n[ 372 ] CVE-2012-0450\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0450\n[ 373 ] CVE-2012-0451\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0451\n[ 374 ] CVE-2012-0452\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0452\n[ 375 ] CVE-2012-0455\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0455\n[ 376 ] CVE-2012-0456\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0456\n[ 377 ] CVE-2012-0457\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0457\n[ 378 ] CVE-2012-0458\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0458\n[ 379 ] CVE-2012-0459\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0459\n[ 380 ] CVE-2012-0460\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0460\n[ 381 ] CVE-2012-0461\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0461\n[ 382 ] CVE-2012-0462\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0462\n[ 383 ] CVE-2012-0463\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0463\n[ 384 ] CVE-2012-0464\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0464\n[ 385 ] CVE-2012-0467\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0467\n[ 386 ] CVE-2012-0468\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0468\n[ 387 ] CVE-2012-0469\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0469\n[ 388 ] CVE-2012-0470\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0470\n[ 389 ] CVE-2012-0471\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0471\n[ 390 ] CVE-2012-0473\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0473\n[ 391 ] CVE-2012-0474\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0474\n[ 392 ] CVE-2012-0475\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0475\n[ 393 ] CVE-2012-0477\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0477\n[ 394 ] CVE-2012-0478\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0478\n[ 395 ] CVE-2012-0479\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0479\n[ 396 ] CVE-2012-1937\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1937\n[ 397 ] CVE-2012-1938\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1938\n[ 398 ] CVE-2012-1939\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1939\n[ 399 ] CVE-2012-1940\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1940\n[ 400 ] CVE-2012-1941\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1941\n[ 401 ] CVE-2012-1945\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1945\n[ 402 ] CVE-2012-1946\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1946\n[ 403 ] CVE-2012-1947\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1947\n[ 404 ] CVE-2012-1948\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1948\n[ 405 ] CVE-2012-1949\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1949\n[ 406 ] CVE-2012-1950\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1950\n[ 407 ] CVE-2012-1951\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1951\n[ 408 ] CVE-2012-1952\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1952\n[ 409 ] CVE-2012-1953\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1953\n[ 410 ] CVE-2012-1954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1954\n[ 411 ] CVE-2012-1955\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1955\n[ 412 ] CVE-2012-1956\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1956\n[ 413 ] CVE-2012-1957\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1957\n[ 414 ] CVE-2012-1958\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1958\n[ 415 ] CVE-2012-1959\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1959\n[ 416 ] CVE-2012-1960\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1960\n[ 417 ] CVE-2012-1961\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1961\n[ 418 ] CVE-2012-1962\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1962\n[ 419 ] CVE-2012-1963\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1963\n[ 420 ] CVE-2012-1964\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1964\n[ 421 ] CVE-2012-1965\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1965\n[ 422 ] CVE-2012-1966\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1966\n[ 423 ] CVE-2012-1967\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1967\n[ 424 ] CVE-2012-1970\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1970\n[ 425 ] CVE-2012-1971\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1971\n[ 426 ] CVE-2012-1972\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1972\n[ 427 ] CVE-2012-1973\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1973\n[ 428 ] CVE-2012-1974\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1974\n[ 429 ] CVE-2012-1975\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1975\n[ 430 ] CVE-2012-1976\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1976\n[ 431 ] CVE-2012-1994\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1994\n[ 432 ] CVE-2012-3956\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3956\n[ 433 ] CVE-2012-3957\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3957\n[ 434 ] CVE-2012-3958\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3958\n[ 435 ] CVE-2012-3959\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3959\n[ 436 ] CVE-2012-3960\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3960\n[ 437 ] CVE-2012-3961\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3961\n[ 438 ] CVE-2012-3962\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3962\n[ 439 ] CVE-2012-3963\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3963\n[ 440 ] CVE-2012-3964\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3964\n[ 441 ] CVE-2012-3965\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3965\n[ 442 ] CVE-2012-3966\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3966\n[ 443 ] CVE-2012-3967\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3967\n[ 444 ] CVE-2012-3968\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3968\n[ 445 ] CVE-2012-3969\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3969\n[ 446 ] CVE-2012-3970\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3970\n[ 447 ] CVE-2012-3971\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3971\n[ 448 ] CVE-2012-3972\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3972\n[ 449 ] CVE-2012-3973\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3973\n[ 450 ] CVE-2012-3975\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3975\n[ 451 ] CVE-2012-3976\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3976\n[ 452 ] CVE-2012-3977\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3977\n[ 453 ] CVE-2012-3978\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3978\n[ 454 ] CVE-2012-3980\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3980\n[ 455 ] CVE-2012-3982\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3982\n[ 456 ] CVE-2012-3984\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3984\n[ 457 ] CVE-2012-3985\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3985\n[ 458 ] CVE-2012-3986\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3986\n[ 459 ] CVE-2012-3988\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3988\n[ 460 ] CVE-2012-3989\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3989\n[ 461 ] CVE-2012-3990\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3990\n[ 462 ] CVE-2012-3991\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3991\n[ 463 ] CVE-2012-3992\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3992\n[ 464 ] CVE-2012-3993\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3993\n[ 465 ] CVE-2012-3994\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3994\n[ 466 ] CVE-2012-3995\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3995\n[ 467 ] CVE-2012-4179\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4179\n[ 468 ] CVE-2012-4180\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4180\n[ 469 ] CVE-2012-4181\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4181\n[ 470 ] CVE-2012-4182\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4182\n[ 471 ] CVE-2012-4183\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4183\n[ 472 ] CVE-2012-4184\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4184\n[ 473 ] CVE-2012-4185\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4185\n[ 474 ] CVE-2012-4186\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4186\n[ 475 ] CVE-2012-4187\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4187\n[ 476 ] CVE-2012-4188\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4188\n[ 477 ] CVE-2012-4190\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4190\n[ 478 ] CVE-2012-4191\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4191\n[ 479 ] CVE-2012-4192\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4192\n[ 480 ] CVE-2012-4193\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4193\n[ 481 ] CVE-2012-4194\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4194\n[ 482 ] CVE-2012-4195\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4195\n[ 483 ] CVE-2012-4196\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4196\n[ 484 ] CVE-2012-4201\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4201\n[ 485 ] CVE-2012-4202\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4202\n[ 486 ] CVE-2012-4204\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4204\n[ 487 ] CVE-2012-4205\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4205\n[ 488 ] CVE-2012-4206\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4206\n[ 489 ] CVE-2012-4207\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4207\n[ 490 ] CVE-2012-4208\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4208\n[ 491 ] CVE-2012-4209\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4209\n[ 492 ] CVE-2012-4210\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4210\n[ 493 ] CVE-2012-4212\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4212\n[ 494 ] CVE-2012-4215\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4215\n[ 495 ] CVE-2012-4216\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4216\n[ 496 ] CVE-2012-5354\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5354\n[ 497 ] CVE-2012-5829\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5829\n[ 498 ] CVE-2012-5830\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5830\n[ 499 ] CVE-2012-5833\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5833\n[ 500 ] CVE-2012-5835\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5835\n[ 501 ] CVE-2012-5836\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5836\n[ 502 ] CVE-2012-5838\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5838\n[ 503 ] CVE-2012-5839\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5839\n[ 504 ] CVE-2012-5840\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5840\n[ 505 ] CVE-2012-5841\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5841\n[ 506 ] CVE-2012-5842\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5842\n[ 507 ] CVE-2012-5843\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5843\n[ 508 ] Firefox Blocking Fraudulent Certificates\n\nhttp://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-c=\nertificates/\n[ 509 ] Mozilla Foundation Security Advisory 2011-11\n http://www.mozilla.org/security/announce/2011/mfsa2011-11.html\n[ 510 ] Mozilla Foundation Security Advisory 2011-34\n http://www.mozilla.org/security/announce/2011/mfsa2011-34.html\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-01.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nNetwork Security Services Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA36093\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/36093/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Network Security Services,\nwhich can potentially be exploited by malicious people to bypass\ncertain security restrictions or to compromise a vulnerable system. \n\n1) An error in the regular expression parser when matching common\nnames in certificates can be exploited to cause a heap-based buffer\noverflow, e.g. via a specially crafted certificate signed by a\ntrusted CA or when a user accepts a specially crafted certificate. \n\n2) An error exists in the parsing of certain certificate fields,\nwhich can be exploited to e.g. get a client to accept a specially\ncrafted certificate by mistake. \n\nSOLUTION:\nUpdate to version 3.12.3 or later. \n\nPROVIDED AND/OR DISCOVERED BY:\nRed Hat credits:\n1) Moxie Marlinspike\n2) Dan Kaminsky\n\nORIGINAL ADVISORY:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=512912\nhttps://bugzilla.redhat.com/show_bug.cgi?id=510251\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n \n This update fixes these vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-2408"
},
{
"db": "VULHUB",
"id": "VHN-39854"
},
{
"db": "PACKETSTORM",
"id": "83396"
},
{
"db": "PACKETSTORM",
"id": "106472"
},
{
"db": "PACKETSTORM",
"id": "87886"
},
{
"db": "PACKETSTORM",
"id": "83397"
},
{
"db": "PACKETSTORM",
"id": "84923"
},
{
"db": "PACKETSTORM",
"id": "80223"
},
{
"db": "PACKETSTORM",
"id": "119293"
},
{
"db": "PACKETSTORM",
"id": "79888"
},
{
"db": "PACKETSTORM",
"id": "82183"
}
],
"trust": 1.8
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-39854",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-39854"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2009-2408",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "37098",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "36125",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "36088",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "36434",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "36157",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "36669",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "36139",
"trust": 1.1
},
{
"db": "OSVDB",
"id": "56723",
"trust": 1.1
},
{
"db": "VUPEN",
"id": "ADV-2009-3184",
"trust": 1.1
},
{
"db": "VUPEN",
"id": "ADV-2009-2085",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1022632",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-200907-442",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.2561",
"trust": 0.6
},
{
"db": "JUNIPER",
"id": "JSA10939",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "83397",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "106472",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "80223",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "82183",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "83396",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "87886",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "81880",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "81228",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "81877",
"trust": 0.1
},
{
"db": "BID",
"id": "35888",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-39854",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "84923",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "119293",
"trust": 0.1
},
{
"db": "SECUNIA",
"id": "36093",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "79888",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-39854"
},
{
"db": "PACKETSTORM",
"id": "83396"
},
{
"db": "PACKETSTORM",
"id": "106472"
},
{
"db": "PACKETSTORM",
"id": "87886"
},
{
"db": "PACKETSTORM",
"id": "83397"
},
{
"db": "PACKETSTORM",
"id": "84923"
},
{
"db": "PACKETSTORM",
"id": "80223"
},
{
"db": "PACKETSTORM",
"id": "119293"
},
{
"db": "PACKETSTORM",
"id": "79888"
},
{
"db": "PACKETSTORM",
"id": "82183"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
},
{
"db": "NVD",
"id": "CVE-2009-2408"
}
]
},
"id": "VAR-200907-0748",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-39854"
}
],
"trust": 0.01
},
"last_update_date": "2026-03-09T22:49:23.947000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-295",
"trust": 1.0
},
{
"problemtype": "CWE-20",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-39854"
},
{
"db": "NVD",
"id": "CVE-2009-2408"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.2,
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"trust": 1.2,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510251"
},
{
"trust": 1.1,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021030.1-1"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id?1022632"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/36088"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/36125"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/36139"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/36157"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/36434"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/36669"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/37098"
},
{
"trust": 1.1,
"url": "http://osvdb.org/56723"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2009/2085"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"trust": 1.1,
"url": "http://www.debian.org/security/2009/dsa-1874"
},
{
"trust": 1.1,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:197"
},
{
"trust": 1.1,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:216"
},
{
"trust": 1.1,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:217"
},
{
"trust": 1.1,
"url": "http://www.redhat.com/support/errata/rhsa-2009-1207.html"
},
{
"trust": 1.1,
"url": "http://www.redhat.com/support/errata/rhsa-2009-1432.html"
},
{
"trust": 1.1,
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html"
},
{
"trust": 1.1,
"url": "http://www.ubuntu.com/usn/usn-810-1"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/810-2/"
},
{
"trust": 1.1,
"url": "http://isc.sans.org/diary.html?storyid=7003"
},
{
"trust": 1.1,
"url": "http://www.wired.com/threatlevel/2009/07/kaminsky/"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10751"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8458"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=oss-security\u0026m=125198917018936\u0026w=2"
},
{
"trust": 1.0,
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026r2=1.11\u0026f=h"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-2408"
},
{
"trust": 0.6,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10939"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.2561/"
},
{
"trust": 0.5,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2408"
},
{
"trust": 0.5,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.5,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-2404"
},
{
"trust": 0.3,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2409"
},
{
"trust": 0.3,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2404"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-2409"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=oss-security\u0026amp;m=125198917018936\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls_m.c.diff?r1=1.8\u0026amp;r2=1.11\u0026amp;f=h"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3720"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org/show_bug.cgi?id=280615"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3720"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3365"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-2702"
},
{
"trust": 0.1,
"url": "http://secunia.com/"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2702"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3365"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_powerpc.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3072"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_hppa.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3075"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_i386.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-0163"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_amd64.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-2463"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_arm.deb"
},
{
"trust": 0.1,
"url": "http://packages.debian.org/\u003cpkg\u003e"
},
{
"trust": 0.1,
"url": "http://security.debian.org/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove_2.0.0.24-0lenny1_arm.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dev_2.0.0.24-0lenny1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-gnome-support_2.0.0.24-0lenny1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/i/icedove/icedove-dbg_2.0.0.24-0lenny1_amd64.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3274"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3382"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3376"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3373"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3373"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/security"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3274"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1055"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3370"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1563"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3372"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1016293"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3374"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3375"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/security_response.html"
},
{
"trust": 0.1,
"url": "https://hostupdate.vmware.com/software/vum/offline/release-181-20091231-153046/esx400-200912001.zip"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos.html"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3374"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3380"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3382"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3376"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1563"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3380"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3375"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3372"
},
{
"trust": 0.1,
"url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3370"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos_vi.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1965"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3985"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0079"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4688"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4070"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0082"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2371"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0169"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4061"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1210"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4181"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1832"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1994"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4058"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1828"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0353"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1838"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3975"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2766"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1205"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4061"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3767"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0473"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0172"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1971"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0479"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2043"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3175"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3973"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3655"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2760"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1187"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1961"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0447"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2462"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0456"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2770"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1125"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3958"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3777"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3003"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0067"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3174"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0168"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0057"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0443"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2993"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3376"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5017"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3555"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1940"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3069"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2989"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5836"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0182"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4179"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2436"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3072"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1208"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3967"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2375"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2376"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3971"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3772"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3977"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3965"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0469"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3978"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4183"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1834"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2472"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3378"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2767"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1952"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0078"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0170"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0164"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0775"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3400"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1211"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3372"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2769"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4188"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5012"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4206"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5354"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5504"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4067"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3648"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0776"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3071"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0477"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2467"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0475"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3962"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2408"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1304"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4201"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4202"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4182"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1206"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3990"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1975"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1392"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4070"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2044"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3183"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3835"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4068"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5507"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4059"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5023"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1308"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1044"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5508"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0654"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0070"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4065"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1307"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3866"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0080"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2984"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0478"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1213"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0352"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5014"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2664"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0051"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3989"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3984"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3371"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3382"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4180"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4068"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4194"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4582"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5502"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4193"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-2437"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3978"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1835"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3993"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5506"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3375"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3078"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0173"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3075"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3969"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0462"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2605"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1169"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1311"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4066"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3658"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1973"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3004"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1950"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1972"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2369"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1215"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4216"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4062"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0463"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3001"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0167"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3381"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3988"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0452"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3837"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1837"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2374"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3994"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1960"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1963"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3167"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0774"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4065"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5022"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5024"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0468"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3026"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1203"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0074"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2061"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0085"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3980"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1966"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1945"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4184"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1959"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4060"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0077"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3000"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0071"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0068"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1974"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0016"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2065"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4066"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0081"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4063"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1955"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1302"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5503"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3374"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3968"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1028"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4059"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3005"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4185"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2986"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0176"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5839"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1121"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3661"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2765"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5913"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3169"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5843"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3663"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3651"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5016"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2372"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1951"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3274"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1197"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3964"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1953"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4067"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2997"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3778"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2996"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3232"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0061"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4063"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3073"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2654"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0354"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5500"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3380"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1212"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0357"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1976"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0773"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0220"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0071"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0777"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0055"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5052"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0165"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2464"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2378"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3131"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0160"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1836"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5513"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3986"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0367"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2752"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3388"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2469"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2753"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3650"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3002"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2764"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3983"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2751"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4190"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2477"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1833"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3389"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2981"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2768"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2991"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0358"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2373"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3670"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3987"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3976"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4582"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3377"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4208"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1956"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4186"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0441"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0054"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3166"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-5014"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2370"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-2671"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2662"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1309"
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1840"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3957"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1585"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5840"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1207"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0445"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2998"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0355"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1200"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2362"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3077"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0056"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2987"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3101"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5501"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4195"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4209"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3985"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1962"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3660"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2762"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5833"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1839"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2988"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0648"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3101"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3168"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0072"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2995"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3399"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0171"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2983"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5841"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5838"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5019"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2985"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0458"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-3073"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3659"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3837"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0066"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3836"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0174"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5842"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0457"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3176"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5511"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0356"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4205"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0178"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3379"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4064"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4508"
},
{
"trust": 0.1,
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-34.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1310"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0016"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1967"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1306"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3079"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2471"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0073"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0474"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0444"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0455"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1954"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4062"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3647"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4210"
},
{
"trust": 0.1,
"url": "http://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-c="
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0017"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1305"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0446"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5835"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3966"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0181"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0069"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5013"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3979"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0450"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1214"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1196"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0449"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0062"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1841"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3179"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0367"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3765"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1947"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3070"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4060"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3992"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1563"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0442"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0175"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1712"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1199"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2365"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2404"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3775"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1198"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2535"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1938"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5505"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1946"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5512"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-5074"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4187"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3766"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2437"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1949"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3776"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5830"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0075"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1202"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0652"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1958"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5015"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0163"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4069"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0179"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1313"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0159"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1939"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3972"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3182"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4207"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-6961"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2990"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3970"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3178"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2671"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4069"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3180"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4191"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3956"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4204"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2763"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2982"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3986"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3654"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2364"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3389"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2980"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3963"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0464"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1209"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2754"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2470"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2210"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1202"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5829"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3982"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3173"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3774"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3995"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5510"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4192"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2463"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0467"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1964"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3959"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3770"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3769"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0772"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3665"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4196"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5822"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2466"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3649"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3653"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3768"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2478"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3988"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1312"
},
{
"trust": 0.1,
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-11.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0058"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3771"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2479"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3383"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1303"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2465"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3170"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2377"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3991"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3982"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-5012"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1957"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2755"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1948"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3961"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0470"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3773"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3076"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0166"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1571"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3984"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3640"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4064"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-2436"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3981"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1970"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0461"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4215"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5021"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4058"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0451"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0771"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0017"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-3836"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-5013"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4212"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0459"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0076"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0083"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0460"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0183"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1201"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3960"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0059"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0177"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3062"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5018"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3177"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3980"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2363"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0084"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3652"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1941"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/glsa/glsa-201301-01.xml"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3074"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1937"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3835"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0053"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3171"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2999"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0471"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0065"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0162"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3373"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2665"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/36093/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512912"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3275"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-39854"
},
{
"db": "PACKETSTORM",
"id": "83396"
},
{
"db": "PACKETSTORM",
"id": "106472"
},
{
"db": "PACKETSTORM",
"id": "87886"
},
{
"db": "PACKETSTORM",
"id": "83397"
},
{
"db": "PACKETSTORM",
"id": "84923"
},
{
"db": "PACKETSTORM",
"id": "80223"
},
{
"db": "PACKETSTORM",
"id": "119293"
},
{
"db": "PACKETSTORM",
"id": "79888"
},
{
"db": "PACKETSTORM",
"id": "82183"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
},
{
"db": "NVD",
"id": "CVE-2009-2408"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-39854"
},
{
"db": "PACKETSTORM",
"id": "83396"
},
{
"db": "PACKETSTORM",
"id": "106472"
},
{
"db": "PACKETSTORM",
"id": "87886"
},
{
"db": "PACKETSTORM",
"id": "83397"
},
{
"db": "PACKETSTORM",
"id": "84923"
},
{
"db": "PACKETSTORM",
"id": "80223"
},
{
"db": "PACKETSTORM",
"id": "119293"
},
{
"db": "PACKETSTORM",
"id": "79888"
},
{
"db": "PACKETSTORM",
"id": "82183"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
},
{
"db": "NVD",
"id": "CVE-2009-2408"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-07-30T00:00:00",
"db": "VULHUB",
"id": "VHN-39854"
},
{
"date": "2009-12-03T20:56:14",
"db": "PACKETSTORM",
"id": "83396"
},
{
"date": "2011-11-01T15:58:59",
"db": "PACKETSTORM",
"id": "106472"
},
{
"date": "2010-04-01T03:25:53",
"db": "PACKETSTORM",
"id": "87886"
},
{
"date": "2009-12-03T20:56:41",
"db": "PACKETSTORM",
"id": "83397"
},
{
"date": "2010-01-07T19:33:17",
"db": "PACKETSTORM",
"id": "84923"
},
{
"date": "2009-08-11T00:22:16",
"db": "PACKETSTORM",
"id": "80223"
},
{
"date": "2013-01-08T03:21:24",
"db": "PACKETSTORM",
"id": "119293"
},
{
"date": "2009-08-04T12:12:18",
"db": "PACKETSTORM",
"id": "79888"
},
{
"date": "2009-10-26T18:46:23",
"db": "PACKETSTORM",
"id": "82183"
},
{
"date": "2009-07-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200907-442"
},
{
"date": "2009-07-30T19:30:00.313000",
"db": "NVD",
"id": "CVE-2009-2408"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-39854"
},
{
"date": "2019-07-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200907-442"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2009-2408"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "87886"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
}
],
"trust": 0.7
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Mozilla NSS Null character CA SSL Certificate Verification Bypass Security Restriction Vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200907-442"
}
],
"trust": 0.6
}
}
CERTA-2009-ALE-014
Vulnerability from certfr_alerte - Published: 2009-08-07 - Updated: 2013-02-05
De multiples vulnérabilités conduisant, entre autres, à une exécution de code arbitraire à distance ont été découvertes dans Mozilla Thunderbird.
Description
De multiples vulnérabilités sont présentes dans la version 2.0.0.23 et dans les versions antérieures du client de messagerie Mozilla Thunderbrid. Ces vulnérabilités permettent de réaliser des actions malveillantes telles que le contournement de la politique de sécurité, l'élévation de privilège, ou encore l'exécution de code arbitraire à distance.
Pour le détail de chaque vulnérabilité, se reporter aux bulletins de sécurité de l'éditeur (cf. section Documentation).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird version 2.0.0.23 et versions antérieures. |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird version 2.0.0.23 et versions ant\u00e9rieures.",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2013-02-05",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans la version 2.0.0.23 et\ndans les versions ant\u00e9rieures du client de messagerie Mozilla\nThunderbrid. Ces vuln\u00e9rabilit\u00e9s permettent de r\u00e9aliser des actions\nmalveillantes telles que le contournement de la politique de s\u00e9curit\u00e9,\nl\u0027\u00e9l\u00e9vation de privil\u00e8ge, ou encore l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n\nPour le d\u00e9tail de chaque vuln\u00e9rabilit\u00e9, se reporter aux bulletins de\ns\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2464"
},
{
"name": "CVE-2009-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2466"
},
{
"name": "CVE-2009-1308",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1308"
},
{
"name": "CVE-2009-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2465"
},
{
"name": "CVE-2009-2462",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2462"
},
{
"name": "CVE-2009-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2463"
},
{
"name": "CVE-2009-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2404"
},
{
"name": "CVE-2009-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1840"
},
{
"name": "CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"name": "CVE-2009-1309",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1309"
}
],
"initial_release_date": "2009-08-07T00:00:00",
"last_revision_date": "2013-02-05T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-19 du 21 avril 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-19.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-34 du 21 juillet 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-42 du 01 ao\u00fbt 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-42.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-43 du 01 ao\u00fbt 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-43.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-18 du 21 avril 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-18.html"
},
{
"title": "Bulletin d\u0027actualit\u00e9 du CERTA num\u00e9ro CERTA-2009-ACT-032 du 07 ao\u00fbt 2009 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2009-ACT-032/index.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de la fondation Mozilla 2009/mfsa2009-31 du 11 juin 2009 :",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-31.html"
}
],
"reference": "CERTA-2009-ALE-014",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2009-08-07T00:00:00.000000"
},
{
"description": "prise en compte de la version 2.0.0.23 ;",
"revision_date": "2009-08-25T00:00:00.000000"
},
{
"description": "fermeture de l\u0027alerte, suite \u00e0 la correction de l\u0027\u00e9diteur.",
"revision_date": "2013-02-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s conduisant, entre autres, \u00e0 une ex\u00e9cution de\ncode arbitraire \u00e0 distance ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Thunderbird.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s du client de messagerie Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Mozilla MFSA2009-18, MFSA2009-19, MFSA2009-31,",
"url": null
},
{
"published_at": null,
"title": "MFSA2009-34, MFSA2009-42, MFSA2009-43",
"url": null
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.