Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-4309 (GCVE-0-2008-4309)
Vulnerability from cvelistv5 – Published: 2008-10-31 20:00 – Updated: 2024-08-07 10:08- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:08:35.116Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "33631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33631"
},
{
"name": "32664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32664"
},
{
"name": "32560",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32560"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "SUSE-SR:2009:003",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html"
},
{
"name": "ADV-2009-0301",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/0301"
},
{
"name": "33746",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33746"
},
{
"name": "RHSA-2008:0971",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html"
},
{
"name": "35074",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35074"
},
{
"name": "35679",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35679"
},
{
"name": "oval:org.mitre.oval:def:9860",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "33003",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33003"
},
{
"name": "262908",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1"
},
{
"name": "32539",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32539"
},
{
"name": "32711",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32711"
},
{
"name": "DSA-1663",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "oval:org.mitre.oval:def:6353",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353"
},
{
"name": "netsnmp-netsnmpcreatesubtreecache-dos(46262)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272"
},
{
"name": "[oss-security] 20081031 New net-snmp DoS",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2008/10/31/1"
},
{
"name": "APPLE-SA-2010-12-16-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"name": "TA09-133A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"name": "oval:org.mitre.oval:def:6171",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171"
},
{
"name": "33095",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33095"
},
{
"name": "ADV-2009-1297",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "1021129",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1021129"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4298"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm"
},
{
"name": "ADV-2008-2973",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2973"
},
{
"name": "32020",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/32020"
},
{
"name": "33821",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33821"
},
{
"name": "ADV-2009-1771",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1771"
},
{
"name": "GLSA-200901-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200901-15.xml"
},
{
"name": "20081112 rPSA-2008-0315-1 net-snmp net-snmp-client net-snmp-server net-snmp-utils",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded"
},
{
"name": "HPSBMA02447",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"name": "USN-685-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"name": "SSRT090062",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"name": "ADV-2008-3400",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/3400"
},
{
"name": "MDVSA-2008:225",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-10-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "33631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33631"
},
{
"name": "32664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32664"
},
{
"name": "32560",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32560"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "SUSE-SR:2009:003",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html"
},
{
"name": "ADV-2009-0301",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/0301"
},
{
"name": "33746",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33746"
},
{
"name": "RHSA-2008:0971",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html"
},
{
"name": "35074",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35074"
},
{
"name": "35679",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35679"
},
{
"name": "oval:org.mitre.oval:def:9860",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "33003",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33003"
},
{
"name": "262908",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1"
},
{
"name": "32539",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32539"
},
{
"name": "32711",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32711"
},
{
"name": "DSA-1663",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "oval:org.mitre.oval:def:6353",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353"
},
{
"name": "netsnmp-netsnmpcreatesubtreecache-dos(46262)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272"
},
{
"name": "[oss-security] 20081031 New net-snmp DoS",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2008/10/31/1"
},
{
"name": "APPLE-SA-2010-12-16-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"name": "TA09-133A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"name": "oval:org.mitre.oval:def:6171",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171"
},
{
"name": "33095",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33095"
},
{
"name": "ADV-2009-1297",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "1021129",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1021129"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4298"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm"
},
{
"name": "ADV-2008-2973",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2973"
},
{
"name": "32020",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/32020"
},
{
"name": "33821",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33821"
},
{
"name": "ADV-2009-1771",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1771"
},
{
"name": "GLSA-200901-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200901-15.xml"
},
{
"name": "20081112 rPSA-2008-0315-1 net-snmp net-snmp-client net-snmp-server net-snmp-utils",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded"
},
{
"name": "HPSBMA02447",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"name": "USN-685-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"name": "SSRT090062",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"name": "ADV-2008-3400",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/3400"
},
{
"name": "MDVSA-2008:225",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2008-4309",
"datePublished": "2008-10-31T20:00:00",
"dateReserved": "2008-09-29T00:00:00",
"dateUpdated": "2024-08-07T10:08:35.116Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2008-4309\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-10-31T20:29:09.497\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.\"},{\"lang\":\"es\",\"value\":\"El c\u00f3digo getbulk en net-snmp 5.4 antes de v5.4.2.1, 5.3 antes de v5.3.2.3, y 5.2 antes de v5.2.5.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores relacionados con el n\u00famero de respuestas o repeticiones.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:5.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F129CD3-B1ED-4FF4-8A86-2F76898E8915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:5.3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53505415-38BE-4EDC-824E-B64B5BF5B0D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950BC4AA-60A3-4512-A452-F205FF843C29\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32539\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32560\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32664\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33003\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33095\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33631\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33746\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33821\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35679\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200901-15.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=882903\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT4298\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1663\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:225\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/31/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0971.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/498280/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/32020\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1021129\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-685-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2973\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3400\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0301\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1771\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46262\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32560\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33746\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33821\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200901-15.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=882903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT4298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:225\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/31/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498280/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/32020\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-685-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0301\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1771\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46262\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
OPENSUSE-SU-2024:11082-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libsnmp30-32bit-5.9-3.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libsnmp30-32bit-5.9-3.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11082",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11082-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-4309 page",
"url": "https://www.suse.com/security/cve/CVE-2008-4309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18065 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18065/"
}
],
"title": "libsnmp30-32bit-5.9-3.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11082-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.9-3.2.aarch64",
"product": {
"name": "libsnmp30-5.9-3.2.aarch64",
"product_id": "libsnmp30-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.9-3.2.aarch64",
"product": {
"name": "libsnmp30-32bit-5.9-3.2.aarch64",
"product_id": "libsnmp30-32bit-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9-3.2.aarch64",
"product": {
"name": "net-snmp-5.9-3.2.aarch64",
"product_id": "net-snmp-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9-3.2.aarch64",
"product": {
"name": "net-snmp-devel-5.9-3.2.aarch64",
"product_id": "net-snmp-devel-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9-3.2.aarch64",
"product": {
"name": "net-snmp-devel-32bit-5.9-3.2.aarch64",
"product_id": "net-snmp-devel-32bit-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9-3.2.aarch64",
"product": {
"name": "perl-SNMP-5.9-3.2.aarch64",
"product_id": "perl-SNMP-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "python36-net-snmp-5.9-3.2.aarch64",
"product": {
"name": "python36-net-snmp-5.9-3.2.aarch64",
"product_id": "python36-net-snmp-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "python38-net-snmp-5.9-3.2.aarch64",
"product": {
"name": "python38-net-snmp-5.9-3.2.aarch64",
"product_id": "python38-net-snmp-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "python39-net-snmp-5.9-3.2.aarch64",
"product": {
"name": "python39-net-snmp-5.9-3.2.aarch64",
"product_id": "python39-net-snmp-5.9-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9-3.2.aarch64",
"product": {
"name": "snmp-mibs-5.9-3.2.aarch64",
"product_id": "snmp-mibs-5.9-3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.9-3.2.ppc64le",
"product": {
"name": "libsnmp30-5.9-3.2.ppc64le",
"product_id": "libsnmp30-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.9-3.2.ppc64le",
"product": {
"name": "libsnmp30-32bit-5.9-3.2.ppc64le",
"product_id": "libsnmp30-32bit-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9-3.2.ppc64le",
"product": {
"name": "net-snmp-5.9-3.2.ppc64le",
"product_id": "net-snmp-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9-3.2.ppc64le",
"product": {
"name": "net-snmp-devel-5.9-3.2.ppc64le",
"product_id": "net-snmp-devel-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9-3.2.ppc64le",
"product": {
"name": "net-snmp-devel-32bit-5.9-3.2.ppc64le",
"product_id": "net-snmp-devel-32bit-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9-3.2.ppc64le",
"product": {
"name": "perl-SNMP-5.9-3.2.ppc64le",
"product_id": "perl-SNMP-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-net-snmp-5.9-3.2.ppc64le",
"product": {
"name": "python36-net-snmp-5.9-3.2.ppc64le",
"product_id": "python36-net-snmp-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-net-snmp-5.9-3.2.ppc64le",
"product": {
"name": "python38-net-snmp-5.9-3.2.ppc64le",
"product_id": "python38-net-snmp-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-net-snmp-5.9-3.2.ppc64le",
"product": {
"name": "python39-net-snmp-5.9-3.2.ppc64le",
"product_id": "python39-net-snmp-5.9-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9-3.2.ppc64le",
"product": {
"name": "snmp-mibs-5.9-3.2.ppc64le",
"product_id": "snmp-mibs-5.9-3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.9-3.2.s390x",
"product": {
"name": "libsnmp30-5.9-3.2.s390x",
"product_id": "libsnmp30-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.9-3.2.s390x",
"product": {
"name": "libsnmp30-32bit-5.9-3.2.s390x",
"product_id": "libsnmp30-32bit-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9-3.2.s390x",
"product": {
"name": "net-snmp-5.9-3.2.s390x",
"product_id": "net-snmp-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9-3.2.s390x",
"product": {
"name": "net-snmp-devel-5.9-3.2.s390x",
"product_id": "net-snmp-devel-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9-3.2.s390x",
"product": {
"name": "net-snmp-devel-32bit-5.9-3.2.s390x",
"product_id": "net-snmp-devel-32bit-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9-3.2.s390x",
"product": {
"name": "perl-SNMP-5.9-3.2.s390x",
"product_id": "perl-SNMP-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "python36-net-snmp-5.9-3.2.s390x",
"product": {
"name": "python36-net-snmp-5.9-3.2.s390x",
"product_id": "python36-net-snmp-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "python38-net-snmp-5.9-3.2.s390x",
"product": {
"name": "python38-net-snmp-5.9-3.2.s390x",
"product_id": "python38-net-snmp-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "python39-net-snmp-5.9-3.2.s390x",
"product": {
"name": "python39-net-snmp-5.9-3.2.s390x",
"product_id": "python39-net-snmp-5.9-3.2.s390x"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9-3.2.s390x",
"product": {
"name": "snmp-mibs-5.9-3.2.s390x",
"product_id": "snmp-mibs-5.9-3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsnmp30-5.9-3.2.x86_64",
"product": {
"name": "libsnmp30-5.9-3.2.x86_64",
"product_id": "libsnmp30-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "libsnmp30-32bit-5.9-3.2.x86_64",
"product": {
"name": "libsnmp30-32bit-5.9-3.2.x86_64",
"product_id": "libsnmp30-32bit-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-5.9-3.2.x86_64",
"product": {
"name": "net-snmp-5.9-3.2.x86_64",
"product_id": "net-snmp-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-5.9-3.2.x86_64",
"product": {
"name": "net-snmp-devel-5.9-3.2.x86_64",
"product_id": "net-snmp-devel-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "net-snmp-devel-32bit-5.9-3.2.x86_64",
"product": {
"name": "net-snmp-devel-32bit-5.9-3.2.x86_64",
"product_id": "net-snmp-devel-32bit-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "perl-SNMP-5.9-3.2.x86_64",
"product": {
"name": "perl-SNMP-5.9-3.2.x86_64",
"product_id": "perl-SNMP-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "python36-net-snmp-5.9-3.2.x86_64",
"product": {
"name": "python36-net-snmp-5.9-3.2.x86_64",
"product_id": "python36-net-snmp-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "python38-net-snmp-5.9-3.2.x86_64",
"product": {
"name": "python38-net-snmp-5.9-3.2.x86_64",
"product_id": "python38-net-snmp-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "python39-net-snmp-5.9-3.2.x86_64",
"product": {
"name": "python39-net-snmp-5.9-3.2.x86_64",
"product_id": "python39-net-snmp-5.9-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "snmp-mibs-5.9-3.2.x86_64",
"product": {
"name": "snmp-mibs-5.9-3.2.x86_64",
"product_id": "snmp-mibs-5.9-3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-5.9-3.2.aarch64"
},
"product_reference": "libsnmp30-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-5.9-3.2.ppc64le"
},
"product_reference": "libsnmp30-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-5.9-3.2.s390x"
},
"product_reference": "libsnmp30-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-5.9-3.2.x86_64"
},
"product_reference": "libsnmp30-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.aarch64"
},
"product_reference": "libsnmp30-32bit-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.ppc64le"
},
"product_reference": "libsnmp30-32bit-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.s390x"
},
"product_reference": "libsnmp30-32bit-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsnmp30-32bit-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.x86_64"
},
"product_reference": "libsnmp30-32bit-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.9-3.2.aarch64"
},
"product_reference": "net-snmp-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.9-3.2.ppc64le"
},
"product_reference": "net-snmp-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.9-3.2.s390x"
},
"product_reference": "net-snmp-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-5.9-3.2.x86_64"
},
"product_reference": "net-snmp-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.aarch64"
},
"product_reference": "net-snmp-devel-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.ppc64le"
},
"product_reference": "net-snmp-devel-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.s390x"
},
"product_reference": "net-snmp-devel-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.x86_64"
},
"product_reference": "net-snmp-devel-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.aarch64"
},
"product_reference": "net-snmp-devel-32bit-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.ppc64le"
},
"product_reference": "net-snmp-devel-32bit-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.s390x"
},
"product_reference": "net-snmp-devel-32bit-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-32bit-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.x86_64"
},
"product_reference": "net-snmp-devel-32bit-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.9-3.2.aarch64"
},
"product_reference": "perl-SNMP-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.9-3.2.ppc64le"
},
"product_reference": "perl-SNMP-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.9-3.2.s390x"
},
"product_reference": "perl-SNMP-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SNMP-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-SNMP-5.9-3.2.x86_64"
},
"product_reference": "perl-SNMP-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-net-snmp-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.aarch64"
},
"product_reference": "python36-net-snmp-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-net-snmp-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.ppc64le"
},
"product_reference": "python36-net-snmp-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-net-snmp-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.s390x"
},
"product_reference": "python36-net-snmp-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-net-snmp-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.x86_64"
},
"product_reference": "python36-net-snmp-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-net-snmp-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.aarch64"
},
"product_reference": "python38-net-snmp-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-net-snmp-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.ppc64le"
},
"product_reference": "python38-net-snmp-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-net-snmp-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.s390x"
},
"product_reference": "python38-net-snmp-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-net-snmp-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.x86_64"
},
"product_reference": "python38-net-snmp-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-net-snmp-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.aarch64"
},
"product_reference": "python39-net-snmp-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-net-snmp-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.ppc64le"
},
"product_reference": "python39-net-snmp-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-net-snmp-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.s390x"
},
"product_reference": "python39-net-snmp-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-net-snmp-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.x86_64"
},
"product_reference": "python39-net-snmp-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.9-3.2.aarch64"
},
"product_reference": "snmp-mibs-5.9-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.9-3.2.ppc64le"
},
"product_reference": "snmp-mibs-5.9-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.9-3.2.s390x"
},
"product_reference": "snmp-mibs-5.9-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "snmp-mibs-5.9-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:snmp-mibs-5.9-3.2.x86_64"
},
"product_reference": "snmp-mibs-5.9-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-4309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-4309"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-4309",
"url": "https://www.suse.com/security/cve/CVE-2008-4309"
},
{
"category": "external",
"summary": "SUSE Bug 440950 for CVE-2008-4309",
"url": "https://bugzilla.suse.com/440950"
},
{
"category": "external",
"summary": "SUSE Bug 514709 for CVE-2008-4309",
"url": "https://bugzilla.suse.com/514709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-4309"
},
{
"cve": "CVE-2018-18065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18065"
}
],
"notes": [
{
"category": "general",
"text": "_set_key in agent/helpers/table_container.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18065",
"url": "https://www.suse.com/security/cve/CVE-2018-18065"
},
{
"category": "external",
"summary": "SUSE Bug 1111122 for CVE-2018-18065",
"url": "https://bugzilla.suse.com/1111122"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2018-18065",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 1145864 for CVE-2018-18065",
"url": "https://bugzilla.suse.com/1145864"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.aarch64",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.s390x",
"openSUSE Tumbleweed:libsnmp30-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-32bit-5.9-3.2.x86_64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.aarch64",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.s390x",
"openSUSE Tumbleweed:net-snmp-devel-5.9-3.2.x86_64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.aarch64",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.s390x",
"openSUSE Tumbleweed:perl-SNMP-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python36-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python38-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.aarch64",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.s390x",
"openSUSE Tumbleweed:python39-net-snmp-5.9-3.2.x86_64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.aarch64",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.ppc64le",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.s390x",
"openSUSE Tumbleweed:snmp-mibs-5.9-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-18065"
}
]
}
GHSA-C4MX-98GV-GXM8
Vulnerability from github – Published: 2022-05-02 00:08 – Updated: 2022-05-02 00:08Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.
{
"affected": [],
"aliases": [
"CVE-2008-4309"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-10-31T20:29:00Z",
"severity": "MODERATE"
},
"details": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.",
"id": "GHSA-c4mx-98gv-gxm8",
"modified": "2022-05-02T00:08:51Z",
"published": "2022-05-02T00:08:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4309"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2008:0971"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2008-4309"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=469349"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"type": "WEB",
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32539"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32560"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32664"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32711"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33003"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33095"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33631"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33746"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33821"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35074"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35679"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200901-15.xml"
},
{
"type": "WEB",
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3549"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4298"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2008/10/31/1"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/32020"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1021129"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2973"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/3400"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/0301"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1771"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2009-AVI-186
Vulnerability from certfr_avis - Published: 2009-05-13 - Updated: 2009-05-13
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. L'exploitation de certaines d'entre elles peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Description
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. Elles touchent divers composants et services installés comme CFNetworks (manipulation des échanges HTTP), CoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation de l'URI help:), QuickDraw Manager (manipulation d'images PICT), Safari (manipulation de l'URI feed:), OpenSSL, PHP, WebKit, X11, etc.
L'exploitation de certaines de ces vulnérabilités peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Solution
Se référer au bulletin de sécurité 2009-002 de Apple pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | Mac OS X Server version 10.4.11 ainsi que celles antérieures. | ||
| Apple | N/A | Mac OS X Server version 10.5.6 ainsi que celles antérieures ; | ||
| Apple | N/A | Mac OS X version 10.5.6 ainsi que celles antérieures ; | ||
| Apple | N/A | Mac OS X version 10.4.11 ainsi que celles antérieures ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X Server version 10.4.11 ainsi que celles ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server version 10.5.6 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.5.6 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.4.11 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. Elles touchent divers composants et\nservices install\u00e9s comme CFNetworks (manipulation des \u00e9changes HTTP),\nCoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation\nde l\u0027URI help:), QuickDraw Manager (manipulation d\u0027images PICT), Safari\n(manipulation de l\u0027URI feed:), OpenSSL, PHP, WebKit, X11, etc.\n\nL\u0027exploitation de certaines de ces vuln\u00e9rabilit\u00e9s peut conduire \u00e0\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 2009-002 de Apple pour l\u0027obtention\ndes correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0160"
},
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2008-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3652"
},
{
"name": "CVE-2009-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0846"
},
{
"name": "CVE-2008-5557",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5557"
},
{
"name": "CVE-2009-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0847"
},
{
"name": "CVE-2009-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0155"
},
{
"name": "CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2008-1517",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1517"
},
{
"name": "CVE-2008-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3660"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0456"
},
{
"name": "CVE-2009-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0943"
},
{
"name": "CVE-2009-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0157"
},
{
"name": "CVE-2008-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3651"
},
{
"name": "CVE-2009-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0010"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2008-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1382"
},
{
"name": "CVE-2004-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1185"
},
{
"name": "CVE-2009-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0148"
},
{
"name": "CVE-2008-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2371"
},
{
"name": "CVE-2008-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3658"
},
{
"name": "CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"name": "CVE-2008-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3659"
},
{
"name": "CVE-2009-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0025"
},
{
"name": "CVE-2008-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3863"
},
{
"name": "CVE-2008-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2383"
},
{
"name": "CVE-2008-3530",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3530"
},
{
"name": "CVE-2009-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0149"
},
{
"name": "CVE-2009-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0154"
},
{
"name": "CVE-2008-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3790"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2008-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2829"
},
{
"name": "CVE-2009-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0165"
},
{
"name": "CVE-2009-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0144"
},
{
"name": "CVE-2009-0162",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0162"
},
{
"name": "CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"name": "CVE-2004-1186",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1186"
},
{
"name": "CVE-2008-2665",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2665"
},
{
"name": "CVE-2009-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0114"
},
{
"name": "CVE-2008-2666",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2666"
},
{
"name": "CVE-2009-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0021"
},
{
"name": "CVE-2009-0519",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0519"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-0844",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0844"
},
{
"name": "CVE-2009-0942",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0942"
},
{
"name": "CVE-2009-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0152"
},
{
"name": "CVE-2009-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0156"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0150"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2007-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2754"
},
{
"name": "CVE-2009-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0845"
},
{
"name": "CVE-2009-0944",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0944"
},
{
"name": "CVE-2009-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0164"
},
{
"name": "CVE-2009-0520",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0520"
},
{
"name": "CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"name": "CVE-2009-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0161"
},
{
"name": "CVE-2008-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0158"
},
{
"name": "CVE-2004-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1184"
},
{
"name": "CVE-2008-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5077"
},
{
"name": "CVE-2006-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0747"
},
{
"name": "CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
}
],
"initial_release_date": "2009-05-13T00:00:00",
"last_revision_date": "2009-05-13T00:00:00",
"links": [
{
"title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:",
"url": "http://support.apple.com/kb/HT3397"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 61798 du 12 mai 2009 :",
"url": "http://docs.info.apple.com/article.html?artnum=61798"
},
{
"title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:",
"url": "http://support.apple.com/kb/HT3549"
}
],
"reference": "CERTA-2009-AVI-186",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de certaines d\u0027entre elles\npeut conduire \u00e0 l\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me\nvuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 2009-002 Apple du 12 mai 2009",
"url": null
}
]
}
CERTA-2010-AVI-620
Vulnerability from certfr_avis - Published: 2010-12-17 - Updated: 2010-12-17
De multiples vulnérabilités affectant le microgiciel des appareils Time Capsule et AirPort Extreme Base Station permettent à un attaquant de contourner la politique de sécurité ou d'effectuer un déni de service à distance.
Description
Cinq vulnérabilités spécifiées par les références CVE suivantes ont été corrigées:
- un débordement d'entier dans la gestion du protocole SNMP permet à un attaquant de provoquer l'arrêt inopiné du service SNMP (CVE-2008-4390) ;
- un utilisateur malveillant du réseau peut effectuer un déni de service (redémarrage de la borne) en envoyant un grand nombre de paquets IPv6, ce qui consomme les ressources de l'appareil. (CVE-2009-2189) ;
- un attaquant peut contourner les règles de pare-feu et contacter un serveur FTP situé derrière le NAT (CVE-2010-0039) ;
- une erreur dans la gestion des paquets ISAKMP fragmentés par le démon racoon permet à un attaquant d'arrêter ce démon de manière inopinée (CVE-2010-1574) ;
- les appareils configurés pour fonctionner en mode pont (bridge), ou configurés en mode NAT avec un hôte par défaut subissent un déni de service lorsque des réponses DHCP spécialement conçues leur sont envoyés.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Time Capsule, versions du microgiciel inf\u00e9rieures \u00e0 7.5.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "AirPort Extreme Base Station, versions du microgiciel inf\u00e9rieures \u00e0 7.5.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nCinq vuln\u00e9rabilit\u00e9s sp\u00e9cifi\u00e9es par les r\u00e9f\u00e9rences CVE suivantes ont \u00e9t\u00e9\ncorrig\u00e9es:\n\n- un d\u00e9bordement d\u0027entier dans la gestion du protocole SNMP permet \u00e0\n un attaquant de provoquer l\u0027arr\u00eat inopin\u00e9 du service SNMP\n (CVE-2008-4390) ;\n- un utilisateur malveillant du r\u00e9seau peut effectuer un d\u00e9ni de\n service (red\u00e9marrage de la borne) en envoyant un grand nombre de\n paquets IPv6, ce qui consomme les ressources de l\u0027appareil.\n (CVE-2009-2189) ;\n- un attaquant peut contourner les r\u00e8gles de pare-feu et contacter un\n serveur FTP situ\u00e9 derri\u00e8re le NAT (CVE-2010-0039) ;\n- une erreur dans la gestion des paquets ISAKMP fragment\u00e9s par le\n d\u00e9mon racoon permet \u00e0 un attaquant d\u0027arr\u00eater ce d\u00e9mon de mani\u00e8re\n inopin\u00e9e (CVE-2010-1574) ;\n- les appareils configur\u00e9s pour fonctionner en mode pont (bridge), ou\n configur\u00e9s en mode NAT avec un h\u00f4te par d\u00e9faut subissent un d\u00e9ni de\n service lorsque des r\u00e9ponses DHCP sp\u00e9cialement con\u00e7ues leur sont\n envoy\u00e9s.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2189",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2189"
},
{
"name": "CVE-2008-4390",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4390"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2010-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1804"
},
{
"name": "CVE-2010-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1574"
},
{
"name": "CVE-2010-0039",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0039"
}
],
"initial_release_date": "2010-12-17T00:00:00",
"last_revision_date": "2010-12-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple APPLE-SA-2010-12-16-1 du 16 d\u00e9cembre 2010 :",
"url": "http://lists.apple.com/archives/security-announce/2010/Dec/msg00001.html"
}
],
"reference": "CERTA-2010-AVI-620",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-12-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s affectant le microgiciel des appareils \u003cspan\nclass=\"textit\"\u003eTime Capsule\u003c/span\u003e et \u003cspan class=\"textit\"\u003eAirPort\nExtreme Base Station\u003c/span\u003e permettent \u00e0 un attaquant de contourner la\npolitique de s\u00e9curit\u00e9 ou d\u0027effectuer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans AirPort Extreme Base Station et Time Capsule",
"vendor_advisories": []
}
CERTFR-2020-AVI-015
Vulnerability from certfr_avis - Published: 2020-01-09 - Updated: 2020-01-09
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper Networks SBR Carrier versions 8.5.x antérieures à 8.5.0R4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D12 sur séries QFX5100 et EX4600 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à R1912 | ||
| Juniper Networks | N/A | Juniper Networks SBR Carrier versions antérieures à 8.4.1R19 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 19.4R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur séries MX | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur série EX4300 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D52 sur séries QFX3500 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks SBR Carrier versions 8.5.x ant\u00e9rieures \u00e0 8.5.0R4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D12 sur s\u00e9ries QFX5100 et EX4600",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 R1912",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks SBR Carrier versions ant\u00e9rieures \u00e0 8.4.1R19",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 19.4R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur s\u00e9ries MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur s\u00e9rie EX4300",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D52 sur s\u00e9ries QFX3500",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1125"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2019-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1071"
},
{
"name": "CVE-2020-1611",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1611"
},
{
"name": "CVE-2018-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1336"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2018-5743",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5743"
},
{
"name": "CVE-2014-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2310"
},
{
"name": "CVE-2018-9568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9568"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-11810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11810"
},
{
"name": "CVE-2020-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1606"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2020-1608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1608"
},
{
"name": "CVE-2020-1602",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1602"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2019-19919",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19919"
},
{
"name": "CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"name": "CVE-2018-17972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17972"
},
{
"name": "CVE-2008-6123",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6123"
},
{
"name": "CVE-2020-1601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1601"
},
{
"name": "CVE-2017-2595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2595"
},
{
"name": "CVE-2016-7061",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7061"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2017-12174",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12174"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2020-1607",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1607"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2019-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1073"
},
{
"name": "CVE-2020-1604",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1604"
},
{
"name": "CVE-2016-7055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7055"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2020-1603",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1603"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2014-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3565"
},
{
"name": "CVE-2020-1609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1609"
},
{
"name": "CVE-2020-1605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1605"
},
{
"name": "CVE-2020-1600",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1600"
}
],
"initial_release_date": "2020-01-09T00:00:00",
"last_revision_date": "2020-01-09T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-015",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10992 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10992\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10986 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10986\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10985 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10985\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10980 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10980\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10981 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10981\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10983 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10983\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10979 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10979\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10987 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10987\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10982 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10982\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10990 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10990\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10991 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10991\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10993 du 08 janvier 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10993\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTA-2008-AVI-540
Vulnerability from certfr_avis - Published: 2008-11-05 - Updated: 2008-11-20
Une vulnérabilité dans net-snmp permet à une personne malintentionnée d'effectuer un déni de service à distance.
Description
Une vulnérabilité de type débordement d'entier a été identifiée dans la fonction netsnmp_create_subtree_cache() du fichier agent/snmpi_agent.c de net-snmp. Son exploitation permet à une personne malintentionnée d'effectuer un déni de service en envoyant une requête GETBULK spécialement conçue à un agent vulnérable.
Solution
Se référer aux bulletins de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "net-snmp 5.3.x versions ant\u00e9rieures \u00e0 5.3.2.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "net-snmp 5.4.x versions ant\u00e9rieures \u00e0 5.4.2.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Net-snmp 5.2.x versions ant\u00e9rieures \u00e0 5.2.5.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement d\u0027entier a \u00e9t\u00e9 identifi\u00e9e dans la\nfonction netsnmp_create_subtree_cache() du fichier agent/snmpi_agent.c\nde net-snmp. Son exploitation permet \u00e0 une personne malintentionn\u00e9e\nd\u0027effectuer un d\u00e9ni de service en envoyant une requ\u00eate GETBULK\nsp\u00e9cialement con\u00e7ue \u00e0 un agent vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
}
],
"initial_release_date": "2008-11-05T00:00:00",
"last_revision_date": "2008-11-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1663 du 09 novembre 2008 :",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RHSA-2008-0971 du 03 novembre 2008 :",
"url": "https://rhn.redhat.com/errata/RHSA-2008-0971.html"
}
],
"reference": "CERTA-2008-AVI-540",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2008-11-05T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin Debian DSA-1663 du 09 novembre 2008.",
"revision_date": "2008-11-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans net-snmp permet \u00e0 une personne malintentionn\u00e9e\nd\u0027effectuer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans net-snmp",
"vendor_advisories": [
{
"published_at": null,
"title": "Rapport de bogue 2205039 de net-snmp",
"url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2205039\u0026group_id=12694\u0026atid=112694"
}
]
}
VAR-200810-0643
Vulnerability from variot - Updated: 2025-12-22 20:18Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats. net-snmp of netsnmp_create_subtree_cache Functions include SNMP GETBULK An integer overflow vulnerability exists due to a flaw in processing requests.Crafted by a third party SNMP GETBULK Service interruption due to request (DoS) There is a possibility of being put into a state. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200901-15
http://security.gentoo.org/
Severity: Normal Title: Net-SNMP: Denial of Service Date: January 21, 2009 Bugs: #245306 ID: 200901-15
Synopsis
A vulnerability in Net-SNMP could lead to a Denial of Service.
Background
Net-SNMP is a collection of tools for generating and retrieving SNMP data. NOTE: The attacker needs to know the community string to exploit this vulnerability.
Workaround
Restrict access to trusted entities only.
Resolution
All Net-SNMP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.2.1"
References
[ 1 ] CVE-2008-4309 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200901-15.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
Affected packages:
Pardus 2008: net-snmp, all before 5.4.1-7-3 net-snmptrap, all before 5.4.1-7-3
Resolution
There are update(s) for net-snmp, net-snmptrap. You can update them via Package Manager or with a single command from console:
pisi up net-snmp net-snmptrap
References
- http://bugs.pardus.org.tr/show_bug.cgi?id=8577
- http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4309
-- Pardus Security Team http://security.pardus.org.tr
Full-Disclosure - We believe in it. This net-snmp update fixes a divide-by- zero flaw in the snmpd daemon.
This vulnerability was introduced by an incorrect fix for
CVE-2008-4309.
Note: After installing the previous patch for net-snmp
(ESX350-200901409-SG), running the snmpbulkwalk command with the
parameter -CnX results in no output, and the snmpd daemon stops. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2010-12-16-1 Time Capsule and AirPort Base Station (802.11n) Firmware 7.5.2
Time Capsule and AirPort Base Station (802.11n) Firmware 7.5.2 is now available and addresses the following:
CVE-ID: CVE-2008-4309 Available for: AirPort Extreme Base Station with 802.11n, AirPort Express Base Station with 802.11n, Time Capsule Impact: A remote attacker may terminate the operation of the SNMP service Description: An integer overflow exists in the netsnmp_create_subtree_cache function. By sending a maliciously crafted SNMPv3 packet, an attacker may cause the SNMP server to terminate, denying service to legitimate clients. By default, the 'WAN SNMP' configuration option is disabled, and the SNMP service is accessible only to other devices on the local network. This issue is addressed by applying the Net-SNMP patches.
CVE-ID: CVE-2009-2189 Available for: AirPort Extreme Base Station with 802.11n, AirPort Express Base Station with 802.11n, Time Capsule Impact: Receiving a large number of IPv6 Router Advertisement (RA) and Neighbor Discovery (ND) packets from a system on the local network may cause the base station to restart Description: A resource consumption issue exists in the base station's handling of Router Advertisement (RA) and Neighbor Discovery (ND) packets. A system on the local network may send a large number of RA and ND packets that could exhaust the base station's resources, causing it to restart unexpectedly. This issue is addressed by rate limiting incoming ICMPv6 packets. Credit to Shoichi Sakane of the KAME project, Kanai Akira of Internet Multifeed Co., Shirahata Shin and Rodney Van Meter of Keio University, and Tatuya Jinmei of Internet Systems Consortium, Inc. for reporting this issue.
CVE-ID: CVE-2010-0039 Available for: AirPort Extreme Base Station with 802.11n, AirPort Express Base Station with 802.11n, Time Capsule Impact: An attacker may be able to query services behind an AirPort Base Station or Time Capsule's NAT from the source IP of the router, if any system behind the NAT has a portmapped FTP server Description: The AirPort Extreme Base Station and Time Capsule's Application-Level Gateway (ALG) rewrites incoming FTP traffic, including PORT commands, to appear as if it is the source. An attacker with write access to an FTP server inside the NAT may issue a malicious PORT command, causing the ALG to send attacker-supplied data to an IP and port behind the NAT. As the data is resent from the Base Station, it could potentially bypass any IP-based restrictions for the service. This issue is addressed by not rewriting inbound PORT commands via the ALG. Credit to Sabahattin Gucukoglu for reporting this issue.
CVE-ID: CVE-2009-1574 Available for: AirPort Extreme Base Station with 802.11n, AirPort Express Base Station with 802.11n, Time Capsule Impact: A remote attacker may be able to cause a denial of service Description: A null pointer dereference in racoon's handling of fragmented ISAKMP packets may allow a remote attacker to cause an unexpected termination of the racoon daemon. This issue is addressed through improved validation of fragmented ISAKMP packets.
CVE-ID: CVE-2010-1804 Available for: AirPort Extreme Base Station with 802.11n, AirPort Express Base Station with 802.11n, Time Capsule Impact: A remote attacker may cause the device to stop processing network traffic Description: An implementation issue exists in the network bridge. Sending a maliciously crafted DHCP reply to the device may cause it to stop responding to network traffic. This issue affects devices that have been configured to act as a bridge, or are configured in Network Address Translation (NAT) mode with a default host enabled. By default, the device operates in NAT mode, and no default host is configured. This update addresses the issue through improved handling of DHCP packets on the network bridge. Credit to Stefan R. Filipek for reporting this issue.
Installation note for Firmware version 7.5.2
Firmware version 7.5.2 is installed into Time Capsule or AirPort Base Station with 802.11n via AirPort Utility, provided with the device.
It is recommended that AirPort Utility 5.5.2 be installed before upgrading to Firmware version 7.5.2.
AirPort Utility 5.5.2 may be obtained through Apple's Software Download site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (Darwin)
iQEcBAEBAgAGBQJNCWXyAAoJEGnF2JsdZQeevTQH/0856gTUzzmL371/nSkhn3qq MCPQVaEMe8O/jy96nlskwzp3X0X0QmXePok1enp6QhDhHm0YL3a4q7YHd4zjm6mM JUoVR4JJRSKOb1bVdEXqo+qG/PH7/5ywfrGas+MjOshMa3gnhYVee39N7Xtz0pHD 3ZllZRwGwad1sQLL7DhJKZ92z6t2GfHoJyK4LZNemkQAL1HyUu7Hj9SlljcVB+Ub xNnpmBXJcCZzp4nRQM+fbLf6bdZ1ua5DTc1pXC8vETtxyHc53G/vLCu8SKBnTBlK JmkpGwG5fXNuYLL8ArFUuEu3zhE7kfdeftUrEez3YeL2DgU9iB8m8RkuuSrVJEY= =WPH8 -----END PGP SIGNATURE-----
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2009-0001 Synopsis: ESX patches address an issue loading corrupt virtual disks and update Service Console packages Issue date: 2009-01-30 Updated on: 2009-01-30 (initial release of advisory) CVE numbers: CVE-2008-4914 CVE-2008-4309 CVE-2008-4226 CVE-2008-4225
- Summary
Updated ESX patches address an issue loading corrupt virtual disks and update Service Console packages for net-snmp and libxml2.
- Relevant releases
VMware ESXi 3.5 without patch ESXe350-200901401-I-SG
VMware ESX 3.5 without patches ESX350-200901401-SG, ESX350-200901409-SG, ESX350-200901410-SG
VMware ESX 3.0.3 without patches ESX303-200901405-SG, ESX303-200901406-SG
VMware ESX 3.0.2 without patches ESX-1007673, ESX-1007674
NOTE: Extended support for ESX 3.5 Update 1 ends on 7/25/2009, users should plan to upgrade to at least ESX 3.5 Update 2 by that time.
Extended support for ESX 3.0.2 Update 1 ends on 2009-08-08.
Users should plan to upgrade to ESX 3.0.3 and preferably to
the newest release available.
- Problem Description
a. Loading a corrupt delta disk may cause ESX to crash
If the VMDK delta disk of a snapshot is corrupt, an ESX host might
crash when the corrupted disk is loaded. VMDK delta files exist
for virtual machines with one or more snapshots. This change ensures
that a corrupt VMDK delta file cannot be used to crash ESX hosts.
A corrupt VMDK delta disk, or virtual machine would have to be loaded
by an administrator.
VMware would like to thank Craig Marshall for reporting this issue.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-4914 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi ESXe350-200901401-I-SG
ESX 3.5 ESX ESX350-200901401-SG
ESX 3.0.3 ESX not affected
ESX 3.0.2 ESX not affected
ESX 2.5.5 ESX not affected
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
b. Updated Service Console package net-snmp
Net-SNMP is an implementation of the Simple Network Management
Protocol (SNMP). SNMP is used by network management systems to
monitor hosts.
A denial-of-service flaw was found in the way Net-SNMP processes
SNMP GETBULK requests. A remote attacker who issued a specially-
crafted request could cause the snmpd server to crash.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-4309 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200901409-SG
ESX 3.0.3 ESX ESX303-200901405-SG
ESX 3.0.2 ESX ESX-1007673
ESX 2.5.5 ESX not affected
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
c. Updated Service Console package libxml2
An integer overflow flaw causing a heap-based buffer overflow was
found in the libxml2 XML parser. If an application linked against
libxml2 processed untrusted, malformed XML content, it could cause
the application to crash or, possibly, execute arbitrary code.
The Common Vulnerabilities and Exposures Project (cve.mitre.org) has
assigned the name CVE-2008-4226 to this issue.
A denial of service flaw was discovered in the libxml2 XML parser.
If an application linked against libxml2 processed untrusted,
malformed XML content, it could cause the application to enter
an infinite loop.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-4225 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200901410-SG
ESX 3.0.3 ESX ESX303-200901406-SG
ESX 3.0.2 ESX ESX-1007674
ESX 2.5.5 ESX affected, patch pending
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
- Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
ESXi
ESXi 3.5 patch ESXe350-200901401-I-SG http://download3.vmware.com/software/vi/ESXe350-200901401-O-SG.zip md5sum: 588dc7bfdee4e4c5ac626906c37fc784 http://kb.vmware.com/kb/1006661
NOTE: The three ESXi patches for Firmware "I", VMware Tools "T," and the VI Client "C" are contained in a single offline "O" download file.
ESX
ESX 3.5 patch ESX350-200901401-SG (VMDK) http://download3.vmware.com/software/vi/ESX350-200901401-SG.zip md5sum: 2769ac30078656b01ca1e2fdfa3230e9 http://kb.vmware.com/kb/1006651
ESX 3.5 patch ESX350-200901409-SG (net-snmp) http://download3.vmware.com/software/vi/ESX350-200901409-SG.zip md5sum: 2c75cd848d9f3c51619b9a7bd60d20a3 http://kb.vmware.com/kb/1006659
ESX 3.5 patch ESX350-200901410-SG (libxml2) http://download3.vmware.com/software/vi/ESX350-200901410-SG.zip md5sum: 061f96373244e7eab3f0d5fe2415ce91 http://kb.vmware.com/kb/1006660
ESX 3.0.3 patch ESX303-200901405-SG (net-snmp) http://download3.vmware.com/software/vi/ESX303-200901405-SG.zip md5sum: 9983b63a1e2dc7fb3d80f0021c1c347c http://kb.vmware.com/kb/1007681
ESX 3.0.3 patch ESX303-200901406-SG (libxml2) http://download3.vmware.com/software/vi/ESX303-200901406-SG.zip md5sum: 2d5a827ccaf406a54dd3a5affee39db0 http://kb.vmware.com/kb/1007682
ESX 3.0.2 patch ESX-1007673 (net-snmp) http://download3.vmware.com/software/vi/ESX-1007673.tgz md5sum: af4a36d2b4d731177210c789df844974 http://kb.vmware.com/kb/1007673
ESX 3.0.2 patch ESX-1007674 (libxml2) http://download3.vmware.com/software/vi/ESX-1007674.tgz md5sum: fb4b5e9a03dea5b9e24cc0766ddd2581 http://kb.vmware.com/kb/1007674
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4914 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225
- Change log
2009-01-30 VMSA-2009-0001 Initial security advisory after release of patches for ESXi, ESX 3.5, ESX 3.0.3, ESX 3.0.2 on 2009-01-30.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2009 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8
wj8DBQFJhAYnS2KysvBH1xkRAiqwAJ47A5mvajtIwB6kZCcNcvUGoraANACbBTsD cgkdo5JKkJLgol+Y2VXW1co= =PvKt -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . By default, the public community name grants read-only access, however it is recommended that the default community name be changed in production.
The updated packages have been patched to correct this issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309
Updated Packages:
Mandriva Linux 2008.0: 63c576c59db3887c9ff46aea999af904 2008.0/i586/libnet-snmp15-5.4.1-1.2mdv2008.0.i586.rpm 208783bde426bc2994b25eac38a2f6f6 2008.0/i586/libnet-snmp-devel-5.4.1-1.2mdv2008.0.i586.rpm 68d9b48a792253fcb647cb44b024fc6a 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.2mdv2008.0.i586.rpm 837f701fa84fbf24f866332d374baea0 2008.0/i586/net-snmp-5.4.1-1.2mdv2008.0.i586.rpm 6b8e3cde829e41e882a2bbde8f70e5c0 2008.0/i586/net-snmp-mibs-5.4.1-1.2mdv2008.0.i586.rpm 9c8d0a70cd23f49af617ebd950ab913b 2008.0/i586/net-snmp-trapd-5.4.1-1.2mdv2008.0.i586.rpm 27f9666d87ad5c63a170fa515c2cfb79 2008.0/i586/net-snmp-utils-5.4.1-1.2mdv2008.0.i586.rpm fa774042539e5fa60662ea26cf5f79bb 2008.0/i586/perl-NetSNMP-5.4.1-1.2mdv2008.0.i586.rpm 62fd3d953786bb45cc442069a9dbae14 2008.0/SRPMS/net-snmp-5.4.1-1.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 7862778bf4b9262707dae0101a051e84 2008.0/x86_64/lib64net-snmp15-5.4.1-1.2mdv2008.0.x86_64.rpm 907423d895272503d6684a7f14618a97 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.2mdv2008.0.x86_64.rpm ba8972ac3af0a41754d7d830237be4a8 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.2mdv2008.0.x86_64.rpm 2f8efd6d1db501439a1da8b205c3ba4b 2008.0/x86_64/net-snmp-5.4.1-1.2mdv2008.0.x86_64.rpm bd431f5a0c11b796223911463216d236 2008.0/x86_64/net-snmp-mibs-5.4.1-1.2mdv2008.0.x86_64.rpm 929e4b2e24137d0aed30e012d2cbee25 2008.0/x86_64/net-snmp-trapd-5.4.1-1.2mdv2008.0.x86_64.rpm 80679956f6b8e3f8095f1767d34cf7c7 2008.0/x86_64/net-snmp-utils-5.4.1-1.2mdv2008.0.x86_64.rpm f8c2af7b036a33dbadf22498933c90b5 2008.0/x86_64/perl-NetSNMP-5.4.1-1.2mdv2008.0.x86_64.rpm 62fd3d953786bb45cc442069a9dbae14 2008.0/SRPMS/net-snmp-5.4.1-1.2mdv2008.0.src.rpm
Mandriva Linux 2008.1: aafe61f1aaaf2e13ef051fc1d7f5ab91 2008.1/i586/libnet-snmp15-5.4.1-5.2mdv2008.1.i586.rpm c7f2b5e4d5955a12b4df0fbf82f38544 2008.1/i586/libnet-snmp-devel-5.4.1-5.2mdv2008.1.i586.rpm f77c410069f938ae382fbee7012a349d 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.2mdv2008.1.i586.rpm 941b90ef50005b50829419575ab80ec1 2008.1/i586/net-snmp-5.4.1-5.2mdv2008.1.i586.rpm d8d459f3213cb97b2708c37c787a7035 2008.1/i586/net-snmp-mibs-5.4.1-5.2mdv2008.1.i586.rpm c753c1d4694d7b8c81f517c0c019accf 2008.1/i586/net-snmp-tkmib-5.4.1-5.2mdv2008.1.i586.rpm 69a0f39e0366cda18fb3cb7440adf2c8 2008.1/i586/net-snmp-trapd-5.4.1-5.2mdv2008.1.i586.rpm 825fe8ac0059480495d5f9f92b41775a 2008.1/i586/net-snmp-utils-5.4.1-5.2mdv2008.1.i586.rpm 61b88005dba39bdad7c18c2774fab3ed 2008.1/i586/perl-NetSNMP-5.4.1-5.2mdv2008.1.i586.rpm 1f73d4a19a2a0a159cdf4d1058ce17f2 2008.1/SRPMS/net-snmp-5.4.1-5.2mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: c4ddb52926754e188afa827365a9402d 2008.1/x86_64/lib64net-snmp15-5.4.1-5.2mdv2008.1.x86_64.rpm b71406ffbf1fddbe11d4e23636015043 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.2mdv2008.1.x86_64.rpm fbed296540545616ff8f248b32e7edf2 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.2mdv2008.1.x86_64.rpm 7e4f56fe2433fd5a80b3ec09ca801755 2008.1/x86_64/net-snmp-5.4.1-5.2mdv2008.1.x86_64.rpm 6275046a91fd1aea967f893720348f88 2008.1/x86_64/net-snmp-mibs-5.4.1-5.2mdv2008.1.x86_64.rpm c05711a0a2a0b69652c6d19e3c883e01 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.2mdv2008.1.x86_64.rpm 012b8391c5c49432d270d247e39fa64a 2008.1/x86_64/net-snmp-trapd-5.4.1-5.2mdv2008.1.x86_64.rpm d05bc5b73d566e16b76517fdd90f968d 2008.1/x86_64/net-snmp-utils-5.4.1-5.2mdv2008.1.x86_64.rpm d37bc36bd7a861f71fce000319904387 2008.1/x86_64/perl-NetSNMP-5.4.1-5.2mdv2008.1.x86_64.rpm 1f73d4a19a2a0a159cdf4d1058ce17f2 2008.1/SRPMS/net-snmp-5.4.1-5.2mdv2008.1.src.rpm
Mandriva Linux 2009.0: 67a289261b50a6ec4bbb74503ff15860 2009.0/i586/libnet-snmp15-5.4.2-2.1mdv2009.0.i586.rpm c0b057998d757e7988cac2276cc16d6a 2009.0/i586/libnet-snmp-devel-5.4.2-2.1mdv2009.0.i586.rpm 340271a223791169762e826744d1aab3 2009.0/i586/libnet-snmp-static-devel-5.4.2-2.1mdv2009.0.i586.rpm 4dad88af5b12b6001adc135e54a5f94c 2009.0/i586/net-snmp-5.4.2-2.1mdv2009.0.i586.rpm 41cc69981bd2dd2886f764f46a19c326 2009.0/i586/net-snmp-mibs-5.4.2-2.1mdv2009.0.i586.rpm 84ebcf44ee0d90e956d138ecafe7a9e0 2009.0/i586/net-snmp-tkmib-5.4.2-2.1mdv2009.0.i586.rpm d9ff03f1bb268735f27d4e70e441675a 2009.0/i586/net-snmp-trapd-5.4.2-2.1mdv2009.0.i586.rpm 7d4891eb14e73c8f53cd7bee93dcab4b 2009.0/i586/net-snmp-utils-5.4.2-2.1mdv2009.0.i586.rpm 66d9db711d7064d6326c50414ffe945b 2009.0/i586/perl-NetSNMP-5.4.2-2.1mdv2009.0.i586.rpm 142a9d0f6b5b895e50c93f66dd112459 2009.0/SRPMS/net-snmp-5.4.2-2.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: d9b76860696183041c5431b28c133d79 2009.0/x86_64/lib64net-snmp15-5.4.2-2.1mdv2009.0.x86_64.rpm 3868b49eec570997ec1bce4603fdb5b1 2009.0/x86_64/lib64net-snmp-devel-5.4.2-2.1mdv2009.0.x86_64.rpm fde92f379f3e6f5d8e3cd307e0d3866d 2009.0/x86_64/lib64net-snmp-static-devel-5.4.2-2.1mdv2009.0.x86_64.rpm 1265e20f1d23728a740ce3e23f6df279 2009.0/x86_64/net-snmp-5.4.2-2.1mdv2009.0.x86_64.rpm e799c8dbd928539d2993f3a4268cf4fc 2009.0/x86_64/net-snmp-mibs-5.4.2-2.1mdv2009.0.x86_64.rpm f34b37e106fe535c6262c0a20824cb71 2009.0/x86_64/net-snmp-tkmib-5.4.2-2.1mdv2009.0.x86_64.rpm dc838be5485af308d3f560dd3dd23845 2009.0/x86_64/net-snmp-trapd-5.4.2-2.1mdv2009.0.x86_64.rpm 66be00a8327d9e0b9fcd4fb22829fd85 2009.0/x86_64/net-snmp-utils-5.4.2-2.1mdv2009.0.x86_64.rpm b22b8c100f8b74be46f87cd9e33bdee3 2009.0/x86_64/perl-NetSNMP-5.4.2-2.1mdv2009.0.x86_64.rpm 142a9d0f6b5b895e50c93f66dd112459 2009.0/SRPMS/net-snmp-5.4.2-2.1mdv2009.0.src.rpm
Corporate 4.0: e830fee5189a6d99235f8b5465cf1cf8 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.3.20060mlcs4.i586.rpm a2b4e29f175d2f9cc0ad8709edbbbd87 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.3.20060mlcs4.i586.rpm 741b5e8a9a8ecaf6f4a2d4849e45bd2f corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.3.20060mlcs4.i586.rpm 94da62fa6bdc660c23e308111f73665e corporate/4.0/i586/net-snmp-5.2.1.2-5.3.20060mlcs4.i586.rpm 373a8f3e0bffea791d866c35dab6f2fa corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.3.20060mlcs4.i586.rpm 002e256aa1c2b0179894f0df8e10e70e corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.3.20060mlcs4.i586.rpm 23ccf736576e9002e84c09db16953ee6 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.3.20060mlcs4.i586.rpm 13dc4a180a0be9c5afe36168278ffdf3 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.3.20060mlcs4.i586.rpm d9cfd05c0de2b6891761627579ccc1d8 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.3.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 7095df865e54764c051f10040b4de25d corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 96a8dbf8ec18e76e4fddf52b2d19b93d corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 9af9807629580025cc1cdaba78826153 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 91d6d06059463804ae085bf42a702132 corporate/4.0/x86_64/net-snmp-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 47e44f0f67b04eae0c63ab9fc6636f10 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 478577d14048824ef556371e43892f0e corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 2766c681f5366ac9e9bfa74ff7388bd5 corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 4ea12420b159bcecc5d7b2cef2bdeb8b corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.3.20060mlcs4.x86_64.rpm d9cfd05c0de2b6891761627579ccc1d8 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.3.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01820968 Version: 1
HPSBMA02447 SSRT090062 rev.1 - Insight Control Suite For Linux (ICE-LX) Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2009-08-12 Last Updated: 2009-08-12
Potential Security Impact: Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities.
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with Insight Control Suite For Linux (ICE-LX). The vulnerabilities could be remotely exploited to allow Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS) and other vulnerabilities.
References: CVE-2009-2677, CVE-2009-0590, CVE-2009-1272, CVE-2008-5161, CVE-2008-4309, CVE-2008-1720
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Insight Control Suite For Linux (ICE-LX) v2.10 or earlier
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2009-2677 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.4 CVE-2009-0590 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2009-1272 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2008-5161 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6 CVE-2008-4309 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2008-1720 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following updated product kit available to resolve the vulnerabilities. The HP ICE-LX v2.11 kit is available as described below.
The update file is HP_ICE_LX_V2.11_511708_004.iso which can be downloaded from here: https://h20392.www2.hp.com/portal/swdepot/try.do?productNumber=HPICELX
The kit can also be obtained by going to http://www.hp.com/go/ice-lx
Open Source packages updated in this version (v2.11) of ICE-LX
net-snmp-5.4.2.1
php 5.2.9
rsync 3.0.5
openssh 5.2 p1
openssl-0.9.8k
PRODUCT SPECIFIC INFORMATION None
HISTORY Version:1 (rev.1) 12 August 2009 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2008-0960
Wes Hardaker reported that the SNMPv3 HMAC verification relies on
the client to specify the HMAC length, which allows spoofing of
authenticated SNMPv3 packets.
CVE-2008-2292
John Kortink reported a buffer overflow in the __snprint_value
function in snmp_get causing a denial of service and potentially
allowing the execution of arbitrary code via a large OCTETSTRING
in an attribute value pair (AVP).
For the stable distribution (etch), these problems has been fixed in version 5.2.3-7etch4.
For the testing distribution (lenny) and unstable distribution (sid) these problems have been fixed in version 5.4.1~dfsg-11.
We recommend that you upgrade your net-snmp package.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Source archives:
http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz Size/MD5 checksum: 94030 2ccd6191c3212980956c30de392825ec http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc Size/MD5 checksum: 1046 8018cc23033178515298d5583a74f9ff http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz Size/MD5 checksum: 4006389 ba4bc583413f90618228d0f196da8181
Architecture independent packages:
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb Size/MD5 checksum: 1214368 d579d8f28f3d704b6c09b2b480425086 http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb Size/MD5 checksum: 855594 b5ccd827adbcefcca3557fa9ae28cc08
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 2169470 265835564ef2b0e2e86a08000461c53b http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 944098 5b903886ee4740842715797e3231602c http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 1901802 5486eb1f2a5b076e5342b1dd9cbb12e2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 933202 e3210ba1641079e0c3aaf4a50e89aedd http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 835584 b14db8c5e5b5e2d34799952975f903fb
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 932008 fc79672bf64eaabd41ed1c2f4a42c7da http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 1890766 ae3832515a97a79b31e0e7f0316356ee http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 835088 62867e9ba9dfca3c7e8ae575d5a478f5 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 918844 d2d1bc5f555bc9dba153e2a9a964ffbf http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 1557924 5c2a33a015dd44708a9cc7602ca2525c
arm architecture (ARM)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb Size/MD5 checksum: 909974 4c1cef835efc0b7ff3fea54a618eabee http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb Size/MD5 checksum: 835284 3ac835d926481c9e0f589b578455ddee http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb Size/MD5 checksum: 928252 b98e98b58c61be02e477185293427d5c http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb Size/MD5 checksum: 1778292 b903adf3d1fa6e7a26f7cafb7bffdd6b http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb Size/MD5 checksum: 1344158 78b6cf6b2974983e8e3670468da73cd1
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 835940 9eeaf116e386dd7733ab2106c662dfa9 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 1809132 78bb5f1c12b004d32fa265e6bd99ffa1 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 1926116 71c7f3095ffe1bb22e84ade21f32b3a4 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 935434 85deac8531b02a0fdf3c9baa21d8e4bd http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 935640 958cb158264f75772864cd5d5c0bf251
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb Size/MD5 checksum: 1423294 f05c7491a8100684c5085588738f05b5 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb Size/MD5 checksum: 833970 cb705c9fe9418cc9348ac935ea7b0ba2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb Size/MD5 checksum: 920070 3df41a0c99c41d1bccf6801011cf8ed5 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb Size/MD5 checksum: 925914 159b4244ef701edbe0fb8c9685b5b477 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb Size/MD5 checksum: 1838900 3b7ac7b8fe0da1a3909ee56aba46d464
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 2205680 6868a56b1db04627e6921bf7237939a2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 970440 783f0cccabfbcc63590730b3803d164d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 2281114 fd04b505755a3aed0fe4c9baaac84500 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 842690 9f9ca89c3d3ba7c46481e9cd39c242a6 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 962854 c8a32f808d719357a5b6350e2b60794e
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb Size/MD5 checksum: 895414 5dd919d188291cb3727d39b5e06c9e26 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb Size/MD5 checksum: 927342 28c245db4d8ea82ba4075b27d674d72a http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb Size/MD5 checksum: 833182 0e0b21e13d77de82bed7a38d30f65e4b http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb Size/MD5 checksum: 1769524 24bdc73a3d20c4046c7741957442c713 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb Size/MD5 checksum: 1717562 977ae5c34a127d32d8f2bf222de9a431
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 1755032 cab5c112911465a9ce23a0d2ea44ded9 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 926616 2bf14a3fe74d9f2a523aacc8b04f5282 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 895194 b7c9ed37bf83ad92371f5472ac5d917b http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 833098 08b63ba6c3becf25ba2f941a532a7b71 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 1720642 1ff7568eb478edee923edb76cf42e9ac
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 941434 bbac9384bd7f88339e2b86fa665208c1 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 835212 4790d79f8de7f1bee7aabf0473f25268 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 1657890 b91fcf52e80c7196cea0c13df9ac79ef http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 1803262 4d298c9509941390c7b2eb68320ad211 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 928170 b17966a6a61313344ac827b58f32eeef
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb Size/MD5 checksum: 1409718 2a128cbdce2522ef49604255cff41af2 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb Size/MD5 checksum: 931452 d3bb7c3a849cd2b35fa6e4acb19c318d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb Size/MD5 checksum: 1834914 67e5b946df18b06b41b3e108d5ddc4e3 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb Size/MD5 checksum: 836102 7a4b85e8ea0e50d7213997b5f7d6309f http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb Size/MD5 checksum: 903864 3f80e78e4e2672aacf3da0690ff24b79
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 925336 5824ea607689f3f1bd62a9e6e28f95ae http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 1548630 1378d1cf730d3026bc1f01a4ab2ccedb http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 918592 28a086f6aa2ee8d510b38c1a177843fc http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 834186 068cbf2b4774ecf9504b820db26e6f1d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 1782014 d39fae5fe0d1397a2a1bd7397d6e850a
These files will probably be moved into the stable distribution on its next update
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200810-0643",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "net-snmp",
"scope": "eq",
"trust": 1.0,
"vendor": "net snmp",
"version": "5.3.2.2"
},
{
"model": "net-snmp",
"scope": "eq",
"trust": 1.0,
"vendor": "net snmp",
"version": "5.4"
},
{
"model": "net-snmp",
"scope": "eq",
"trust": 1.0,
"vendor": "net snmp",
"version": "5.2.5"
},
{
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.2.5.1"
},
{
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.3.2.3"
},
{
"model": "net-snmp",
"scope": "lt",
"trust": 0.8,
"vendor": "net snmp",
"version": "5.4.2.1"
},
{
"model": "airmac express",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "base station (802.11n)"
},
{
"model": "airmac extreme",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "base station (802.11n)"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.4.11"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5 to v10.5.6"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.4.11"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5 to v10.5.6"
},
{
"model": "time capsule",
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86-64)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0 (x86-64)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(sparc)"
},
{
"model": "opensolaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "(x86)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (sparc)"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "sun microsystems",
"version": "10 (x86)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (as)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (es)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (ws)"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (server)"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.0 (client)"
},
{
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (client)"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"db": "NVD",
"id": "CVE-2008-4309"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:net-snmp:net-snmp",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:apple:airmac_extreme",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apple:time_capsule",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:sun:opensolaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:sun:solaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "VMware",
"sources": [
{
"db": "PACKETSTORM",
"id": "86380"
},
{
"db": "PACKETSTORM",
"id": "74528"
}
],
"trust": 0.2
},
"cve": "CVE-2008-4309",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2008-4309",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2008-4309",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2008-4309",
"trust": 0.8,
"value": "Medium"
},
{
"author": "VULMON",
"id": "CVE-2008-4309",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-4309"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"db": "NVD",
"id": "CVE-2008-4309"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats. net-snmp of netsnmp_create_subtree_cache Functions include SNMP GETBULK An integer overflow vulnerability exists due to a flaw in processing requests.Crafted by a third party SNMP GETBULK Service interruption due to request (DoS) There is a possibility of being put into a state. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200901-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Net-SNMP: Denial of Service\n Date: January 21, 2009\n Bugs: #245306\n ID: 200901-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA vulnerability in Net-SNMP could lead to a Denial of Service. \n\nBackground\n==========\n\nNet-SNMP is a collection of tools for generating and retrieving SNMP\ndata. NOTE: The attacker needs to know the community string to\nexploit this vulnerability. \n\nWorkaround\n==========\n\nRestrict access to trusted entities only. \n\nResolution\n==========\n\nAll Net-SNMP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-analyzer/net-snmp-5.4.2.1\"\n\nReferences\n==========\n\n [ 1 ] CVE-2008-4309\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200901-15.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2009 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n\n. \n\n\nAffected packages:\n\n Pardus 2008:\n net-snmp, all before 5.4.1-7-3\n net-snmptrap, all before 5.4.1-7-3\n\n\n\nResolution\n==========\n\nThere are update(s) for net-snmp, net-snmptrap. You can update them via \nPackage Manager or with a single command from console: \n\n pisi up net-snmp net-snmptrap\n\nReferences\n==========\n\n * http://bugs.pardus.org.tr/show_bug.cgi?id=8577\n * http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4309\n\n------------------------------------------------------------------------\n\n-- \nPardus Security Team\nhttp://security.pardus.org.tr\n\n\n_______________________________________________\nFull-Disclosure - We believe in it. This net-snmp update fixes a divide-by-\n zero flaw in the snmpd daemon. \n\n This vulnerability was introduced by an incorrect fix for\n CVE-2008-4309. \n\n Note: After installing the previous patch for net-snmp\n (ESX350-200901409-SG), running the snmpbulkwalk command with the\n parameter -CnX results in no output, and the snmpd daemon stops. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2010-12-16-1 Time Capsule and AirPort Base Station\n(802.11n) Firmware 7.5.2\n\nTime Capsule and AirPort Base Station (802.11n) Firmware 7.5.2 is\nnow available and addresses the following:\n\nCVE-ID: CVE-2008-4309\nAvailable for: AirPort Extreme Base Station with 802.11n,\nAirPort Express Base Station with 802.11n, Time Capsule\nImpact: A remote attacker may terminate the operation of the SNMP\nservice\nDescription: An integer overflow exists in the\nnetsnmp_create_subtree_cache function. By sending a maliciously\ncrafted SNMPv3 packet, an attacker may cause the SNMP server to\nterminate, denying service to legitimate clients. By default, the\n\u0027WAN SNMP\u0027 configuration option is disabled, and the SNMP service is\naccessible only to other devices on the local network. This issue is\naddressed by applying the Net-SNMP patches. \n\nCVE-ID: CVE-2009-2189\nAvailable for: AirPort Extreme Base Station with 802.11n,\nAirPort Express Base Station with 802.11n, Time Capsule\nImpact: Receiving a large number of IPv6 Router Advertisement (RA)\nand Neighbor Discovery (ND) packets from a system on the local\nnetwork may cause the base station to restart\nDescription: A resource consumption issue exists in the base\nstation\u0027s handling of Router Advertisement (RA) and Neighbor\nDiscovery (ND) packets. A system on the local network may send a\nlarge number of RA and ND packets that could exhaust the base\nstation\u0027s resources, causing it to restart unexpectedly. This issue\nis addressed by rate limiting incoming ICMPv6 packets. Credit to\nShoichi Sakane of the KAME project, Kanai Akira of Internet Multifeed\nCo., Shirahata Shin and Rodney Van Meter of Keio University, and\nTatuya Jinmei of Internet Systems Consortium, Inc. for reporting this\nissue. \n\nCVE-ID: CVE-2010-0039\nAvailable for: AirPort Extreme Base Station with 802.11n,\nAirPort Express Base Station with 802.11n, Time Capsule\nImpact: An attacker may be able to query services behind an AirPort\nBase Station or Time Capsule\u0027s NAT from the source IP of the router,\nif any system behind the NAT has a portmapped FTP server\nDescription: The AirPort Extreme Base Station and Time Capsule\u0027s\nApplication-Level Gateway (ALG) rewrites incoming FTP traffic,\nincluding PORT commands, to appear as if it is the source. An\nattacker with write access to an FTP server inside the NAT may issue\na malicious PORT command, causing the ALG to send attacker-supplied\ndata to an IP and port behind the NAT. As the data is resent from the\nBase Station, it could potentially bypass any IP-based restrictions\nfor the service. This issue is addressed by not rewriting inbound\nPORT commands via the ALG. Credit to Sabahattin Gucukoglu for\nreporting this issue. \n\nCVE-ID: CVE-2009-1574\nAvailable for: AirPort Extreme Base Station with 802.11n,\nAirPort Express Base Station with 802.11n, Time Capsule\nImpact: A remote attacker may be able to cause a denial of service\nDescription: A null pointer dereference in racoon\u0027s handling of\nfragmented ISAKMP packets may allow a remote attacker to cause an\nunexpected termination of the racoon daemon. This issue is addressed\nthrough improved validation of fragmented ISAKMP packets. \n\nCVE-ID: CVE-2010-1804\nAvailable for: AirPort Extreme Base Station with 802.11n,\nAirPort Express Base Station with 802.11n, Time Capsule\nImpact: A remote attacker may cause the device to stop processing\nnetwork traffic\nDescription: An implementation issue exists in the network bridge. \nSending a maliciously crafted DHCP reply to the device may cause it\nto stop responding to network traffic. This issue affects devices\nthat have been configured to act as a bridge, or are configured in\nNetwork Address Translation (NAT) mode with a default host enabled. \nBy default, the device operates in NAT mode, and no default host is\nconfigured. This update addresses the issue through improved handling\nof DHCP packets on the network bridge. Credit to Stefan R. Filipek\nfor reporting this issue. \n\n\nInstallation note for Firmware version 7.5.2\n\nFirmware version 7.5.2 is installed into Time Capsule or AirPort Base\nStation with 802.11n via AirPort Utility, provided with the device. \n\nIt is recommended that AirPort Utility 5.5.2 be installed before\nupgrading to Firmware version 7.5.2. \n\nAirPort Utility 5.5.2 may be obtained through Apple\u0027s Software\nDownload site: http://www.apple.com/support/downloads/\n\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.0.9 (Darwin)\n\niQEcBAEBAgAGBQJNCWXyAAoJEGnF2JsdZQeevTQH/0856gTUzzmL371/nSkhn3qq\nMCPQVaEMe8O/jy96nlskwzp3X0X0QmXePok1enp6QhDhHm0YL3a4q7YHd4zjm6mM\nJUoVR4JJRSKOb1bVdEXqo+qG/PH7/5ywfrGas+MjOshMa3gnhYVee39N7Xtz0pHD\n3ZllZRwGwad1sQLL7DhJKZ92z6t2GfHoJyK4LZNemkQAL1HyUu7Hj9SlljcVB+Ub\nxNnpmBXJcCZzp4nRQM+fbLf6bdZ1ua5DTc1pXC8vETtxyHc53G/vLCu8SKBnTBlK\nJmkpGwG5fXNuYLL8ArFUuEu3zhE7kfdeftUrEez3YeL2DgU9iB8m8RkuuSrVJEY=\n=WPH8\n-----END PGP SIGNATURE-----\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2009-0001\nSynopsis: ESX patches address an issue loading corrupt virtual\n disks and update Service Console packages\nIssue date: 2009-01-30\nUpdated on: 2009-01-30 (initial release of advisory)\nCVE numbers: CVE-2008-4914 CVE-2008-4309 CVE-2008-4226\n CVE-2008-4225\n- ------------------------------------------------------------------------\n\n1. Summary\n\n Updated ESX patches address an issue loading corrupt\n virtual disks and update Service Console packages\n for net-snmp and libxml2. \n\n2. Relevant releases\n\n VMware ESXi 3.5 without patch ESXe350-200901401-I-SG\n\n VMware ESX 3.5 without patches ESX350-200901401-SG,\n ESX350-200901409-SG,\n ESX350-200901410-SG\n\n VMware ESX 3.0.3 without patches ESX303-200901405-SG,\n ESX303-200901406-SG\n\n VMware ESX 3.0.2 without patches ESX-1007673, ESX-1007674\n\n NOTE: Extended support for ESX 3.5 Update 1 ends on 7/25/2009, users\n should plan to upgrade to at least ESX 3.5 Update 2 by that\n time. \n\n Extended support for ESX 3.0.2 Update 1 ends on 2009-08-08. \n Users should plan to upgrade to ESX 3.0.3 and preferably to\n the newest release available. \n\n3. Problem Description\n\n a. Loading a corrupt delta disk may cause ESX to crash\n\n If the VMDK delta disk of a snapshot is corrupt, an ESX host might\n crash when the corrupted disk is loaded. VMDK delta files exist\n for virtual machines with one or more snapshots. This change ensures\n that a corrupt VMDK delta file cannot be used to crash ESX hosts. \n\n A corrupt VMDK delta disk, or virtual machine would have to be loaded\n by an administrator. \n\n VMware would like to thank Craig Marshall for reporting this issue. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2008-4914 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi ESXe350-200901401-I-SG\n\n ESX 3.5 ESX ESX350-200901401-SG\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX not affected\n ESX 2.5.5 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n b. Updated Service Console package net-snmp\n\n Net-SNMP is an implementation of the Simple Network Management\n Protocol (SNMP). SNMP is used by network management systems to\n monitor hosts. \n\n A denial-of-service flaw was found in the way Net-SNMP processes\n SNMP GETBULK requests. A remote attacker who issued a specially-\n crafted request could cause the snmpd server to crash. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2008-4309 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200901409-SG\n ESX 3.0.3 ESX ESX303-200901405-SG\n ESX 3.0.2 ESX ESX-1007673\n ESX 2.5.5 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n c. Updated Service Console package libxml2\n\n An integer overflow flaw causing a heap-based buffer overflow was\n found in the libxml2 XML parser. If an application linked against\n libxml2 processed untrusted, malformed XML content, it could cause\n the application to crash or, possibly, execute arbitrary code. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org) has\n assigned the name CVE-2008-4226 to this issue. \n\n A denial of service flaw was discovered in the libxml2 XML parser. \n If an application linked against libxml2 processed untrusted,\n malformed XML content, it could cause the application to enter\n an infinite loop. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2008-4225 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200901410-SG\n ESX 3.0.3 ESX ESX303-200901406-SG\n ESX 3.0.2 ESX ESX-1007674\n ESX 2.5.5 ESX affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n ESXi\n ----\n ESXi 3.5 patch ESXe350-200901401-I-SG\n http://download3.vmware.com/software/vi/ESXe350-200901401-O-SG.zip\n md5sum: 588dc7bfdee4e4c5ac626906c37fc784\n http://kb.vmware.com/kb/1006661\n\n NOTE: The three ESXi patches for Firmware \"I\", VMware Tools \"T,\" and\n the VI Client \"C\" are contained in a single offline \"O\"\n download file. \n\n ESX\n ---\n ESX 3.5 patch ESX350-200901401-SG (VMDK)\n http://download3.vmware.com/software/vi/ESX350-200901401-SG.zip\n md5sum: 2769ac30078656b01ca1e2fdfa3230e9\n http://kb.vmware.com/kb/1006651\n\n ESX 3.5 patch ESX350-200901409-SG (net-snmp)\n http://download3.vmware.com/software/vi/ESX350-200901409-SG.zip\n md5sum: 2c75cd848d9f3c51619b9a7bd60d20a3\n http://kb.vmware.com/kb/1006659\n\n ESX 3.5 patch ESX350-200901410-SG (libxml2)\n http://download3.vmware.com/software/vi/ESX350-200901410-SG.zip\n md5sum: 061f96373244e7eab3f0d5fe2415ce91\n http://kb.vmware.com/kb/1006660\n\n ESX 3.0.3 patch ESX303-200901405-SG (net-snmp)\n http://download3.vmware.com/software/vi/ESX303-200901405-SG.zip\n md5sum: 9983b63a1e2dc7fb3d80f0021c1c347c\n http://kb.vmware.com/kb/1007681\n\n ESX 3.0.3 patch ESX303-200901406-SG (libxml2)\n http://download3.vmware.com/software/vi/ESX303-200901406-SG.zip\n md5sum: 2d5a827ccaf406a54dd3a5affee39db0\n http://kb.vmware.com/kb/1007682\n\n ESX 3.0.2 patch ESX-1007673 (net-snmp)\n http://download3.vmware.com/software/vi/ESX-1007673.tgz\n md5sum: af4a36d2b4d731177210c789df844974\n http://kb.vmware.com/kb/1007673\n\n ESX 3.0.2 patch ESX-1007674 (libxml2)\n http://download3.vmware.com/software/vi/ESX-1007674.tgz\n md5sum: fb4b5e9a03dea5b9e24cc0766ddd2581\n http://kb.vmware.com/kb/1007674\n\n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4914\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2009-01-30 VMSA-2009-0001\nInitial security advisory after release of patches for ESXi, ESX 3.5,\nESX 3.0.3, ESX 3.0.2 on 2009-01-30. \n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2009 VMware Inc. All rights reserved. \n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 9.8.3 (Build 4028)\nCharset: utf-8\n\nwj8DBQFJhAYnS2KysvBH1xkRAiqwAJ47A5mvajtIwB6kZCcNcvUGoraANACbBTsD\ncgkdo5JKkJLgol+Y2VXW1co=\n=PvKt\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. By default, the public\n community name grants read-only access, however it is recommended\n that the default community name be changed in production. \n \n The updated packages have been patched to correct this issue. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.0:\n 63c576c59db3887c9ff46aea999af904 2008.0/i586/libnet-snmp15-5.4.1-1.2mdv2008.0.i586.rpm\n 208783bde426bc2994b25eac38a2f6f6 2008.0/i586/libnet-snmp-devel-5.4.1-1.2mdv2008.0.i586.rpm\n 68d9b48a792253fcb647cb44b024fc6a 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.2mdv2008.0.i586.rpm\n 837f701fa84fbf24f866332d374baea0 2008.0/i586/net-snmp-5.4.1-1.2mdv2008.0.i586.rpm\n 6b8e3cde829e41e882a2bbde8f70e5c0 2008.0/i586/net-snmp-mibs-5.4.1-1.2mdv2008.0.i586.rpm\n 9c8d0a70cd23f49af617ebd950ab913b 2008.0/i586/net-snmp-trapd-5.4.1-1.2mdv2008.0.i586.rpm\n 27f9666d87ad5c63a170fa515c2cfb79 2008.0/i586/net-snmp-utils-5.4.1-1.2mdv2008.0.i586.rpm\n fa774042539e5fa60662ea26cf5f79bb 2008.0/i586/perl-NetSNMP-5.4.1-1.2mdv2008.0.i586.rpm \n 62fd3d953786bb45cc442069a9dbae14 2008.0/SRPMS/net-snmp-5.4.1-1.2mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 7862778bf4b9262707dae0101a051e84 2008.0/x86_64/lib64net-snmp15-5.4.1-1.2mdv2008.0.x86_64.rpm\n 907423d895272503d6684a7f14618a97 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.2mdv2008.0.x86_64.rpm\n ba8972ac3af0a41754d7d830237be4a8 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.2mdv2008.0.x86_64.rpm\n 2f8efd6d1db501439a1da8b205c3ba4b 2008.0/x86_64/net-snmp-5.4.1-1.2mdv2008.0.x86_64.rpm\n bd431f5a0c11b796223911463216d236 2008.0/x86_64/net-snmp-mibs-5.4.1-1.2mdv2008.0.x86_64.rpm\n 929e4b2e24137d0aed30e012d2cbee25 2008.0/x86_64/net-snmp-trapd-5.4.1-1.2mdv2008.0.x86_64.rpm\n 80679956f6b8e3f8095f1767d34cf7c7 2008.0/x86_64/net-snmp-utils-5.4.1-1.2mdv2008.0.x86_64.rpm\n f8c2af7b036a33dbadf22498933c90b5 2008.0/x86_64/perl-NetSNMP-5.4.1-1.2mdv2008.0.x86_64.rpm \n 62fd3d953786bb45cc442069a9dbae14 2008.0/SRPMS/net-snmp-5.4.1-1.2mdv2008.0.src.rpm\n\n Mandriva Linux 2008.1:\n aafe61f1aaaf2e13ef051fc1d7f5ab91 2008.1/i586/libnet-snmp15-5.4.1-5.2mdv2008.1.i586.rpm\n c7f2b5e4d5955a12b4df0fbf82f38544 2008.1/i586/libnet-snmp-devel-5.4.1-5.2mdv2008.1.i586.rpm\n f77c410069f938ae382fbee7012a349d 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.2mdv2008.1.i586.rpm\n 941b90ef50005b50829419575ab80ec1 2008.1/i586/net-snmp-5.4.1-5.2mdv2008.1.i586.rpm\n d8d459f3213cb97b2708c37c787a7035 2008.1/i586/net-snmp-mibs-5.4.1-5.2mdv2008.1.i586.rpm\n c753c1d4694d7b8c81f517c0c019accf 2008.1/i586/net-snmp-tkmib-5.4.1-5.2mdv2008.1.i586.rpm\n 69a0f39e0366cda18fb3cb7440adf2c8 2008.1/i586/net-snmp-trapd-5.4.1-5.2mdv2008.1.i586.rpm\n 825fe8ac0059480495d5f9f92b41775a 2008.1/i586/net-snmp-utils-5.4.1-5.2mdv2008.1.i586.rpm\n 61b88005dba39bdad7c18c2774fab3ed 2008.1/i586/perl-NetSNMP-5.4.1-5.2mdv2008.1.i586.rpm \n 1f73d4a19a2a0a159cdf4d1058ce17f2 2008.1/SRPMS/net-snmp-5.4.1-5.2mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n c4ddb52926754e188afa827365a9402d 2008.1/x86_64/lib64net-snmp15-5.4.1-5.2mdv2008.1.x86_64.rpm\n b71406ffbf1fddbe11d4e23636015043 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.2mdv2008.1.x86_64.rpm\n fbed296540545616ff8f248b32e7edf2 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.2mdv2008.1.x86_64.rpm\n 7e4f56fe2433fd5a80b3ec09ca801755 2008.1/x86_64/net-snmp-5.4.1-5.2mdv2008.1.x86_64.rpm\n 6275046a91fd1aea967f893720348f88 2008.1/x86_64/net-snmp-mibs-5.4.1-5.2mdv2008.1.x86_64.rpm\n c05711a0a2a0b69652c6d19e3c883e01 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.2mdv2008.1.x86_64.rpm\n 012b8391c5c49432d270d247e39fa64a 2008.1/x86_64/net-snmp-trapd-5.4.1-5.2mdv2008.1.x86_64.rpm\n d05bc5b73d566e16b76517fdd90f968d 2008.1/x86_64/net-snmp-utils-5.4.1-5.2mdv2008.1.x86_64.rpm\n d37bc36bd7a861f71fce000319904387 2008.1/x86_64/perl-NetSNMP-5.4.1-5.2mdv2008.1.x86_64.rpm \n 1f73d4a19a2a0a159cdf4d1058ce17f2 2008.1/SRPMS/net-snmp-5.4.1-5.2mdv2008.1.src.rpm\n\n Mandriva Linux 2009.0:\n 67a289261b50a6ec4bbb74503ff15860 2009.0/i586/libnet-snmp15-5.4.2-2.1mdv2009.0.i586.rpm\n c0b057998d757e7988cac2276cc16d6a 2009.0/i586/libnet-snmp-devel-5.4.2-2.1mdv2009.0.i586.rpm\n 340271a223791169762e826744d1aab3 2009.0/i586/libnet-snmp-static-devel-5.4.2-2.1mdv2009.0.i586.rpm\n 4dad88af5b12b6001adc135e54a5f94c 2009.0/i586/net-snmp-5.4.2-2.1mdv2009.0.i586.rpm\n 41cc69981bd2dd2886f764f46a19c326 2009.0/i586/net-snmp-mibs-5.4.2-2.1mdv2009.0.i586.rpm\n 84ebcf44ee0d90e956d138ecafe7a9e0 2009.0/i586/net-snmp-tkmib-5.4.2-2.1mdv2009.0.i586.rpm\n d9ff03f1bb268735f27d4e70e441675a 2009.0/i586/net-snmp-trapd-5.4.2-2.1mdv2009.0.i586.rpm\n 7d4891eb14e73c8f53cd7bee93dcab4b 2009.0/i586/net-snmp-utils-5.4.2-2.1mdv2009.0.i586.rpm\n 66d9db711d7064d6326c50414ffe945b 2009.0/i586/perl-NetSNMP-5.4.2-2.1mdv2009.0.i586.rpm \n 142a9d0f6b5b895e50c93f66dd112459 2009.0/SRPMS/net-snmp-5.4.2-2.1mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n d9b76860696183041c5431b28c133d79 2009.0/x86_64/lib64net-snmp15-5.4.2-2.1mdv2009.0.x86_64.rpm\n 3868b49eec570997ec1bce4603fdb5b1 2009.0/x86_64/lib64net-snmp-devel-5.4.2-2.1mdv2009.0.x86_64.rpm\n fde92f379f3e6f5d8e3cd307e0d3866d 2009.0/x86_64/lib64net-snmp-static-devel-5.4.2-2.1mdv2009.0.x86_64.rpm\n 1265e20f1d23728a740ce3e23f6df279 2009.0/x86_64/net-snmp-5.4.2-2.1mdv2009.0.x86_64.rpm\n e799c8dbd928539d2993f3a4268cf4fc 2009.0/x86_64/net-snmp-mibs-5.4.2-2.1mdv2009.0.x86_64.rpm\n f34b37e106fe535c6262c0a20824cb71 2009.0/x86_64/net-snmp-tkmib-5.4.2-2.1mdv2009.0.x86_64.rpm\n dc838be5485af308d3f560dd3dd23845 2009.0/x86_64/net-snmp-trapd-5.4.2-2.1mdv2009.0.x86_64.rpm\n 66be00a8327d9e0b9fcd4fb22829fd85 2009.0/x86_64/net-snmp-utils-5.4.2-2.1mdv2009.0.x86_64.rpm\n b22b8c100f8b74be46f87cd9e33bdee3 2009.0/x86_64/perl-NetSNMP-5.4.2-2.1mdv2009.0.x86_64.rpm \n 142a9d0f6b5b895e50c93f66dd112459 2009.0/SRPMS/net-snmp-5.4.2-2.1mdv2009.0.src.rpm\n\n Corporate 4.0:\n e830fee5189a6d99235f8b5465cf1cf8 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.3.20060mlcs4.i586.rpm\n a2b4e29f175d2f9cc0ad8709edbbbd87 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 741b5e8a9a8ecaf6f4a2d4849e45bd2f corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 94da62fa6bdc660c23e308111f73665e corporate/4.0/i586/net-snmp-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 373a8f3e0bffea791d866c35dab6f2fa corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 002e256aa1c2b0179894f0df8e10e70e corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 23ccf736576e9002e84c09db16953ee6 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 13dc4a180a0be9c5afe36168278ffdf3 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.3.20060mlcs4.i586.rpm \n d9cfd05c0de2b6891761627579ccc1d8 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.3.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 7095df865e54764c051f10040b4de25d corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 96a8dbf8ec18e76e4fddf52b2d19b93d corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 9af9807629580025cc1cdaba78826153 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 91d6d06059463804ae085bf42a702132 corporate/4.0/x86_64/net-snmp-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 47e44f0f67b04eae0c63ab9fc6636f10 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 478577d14048824ef556371e43892f0e corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 2766c681f5366ac9e9bfa74ff7388bd5 corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 4ea12420b159bcecc5d7b2cef2bdeb8b corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.3.20060mlcs4.x86_64.rpm \n d9cfd05c0de2b6891761627579ccc1d8 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.3.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c01820968\nVersion: 1\n\nHPSBMA02447 SSRT090062 rev.1 - Insight Control Suite For Linux (ICE-LX) Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2009-08-12\nLast Updated: 2009-08-12\n\nPotential Security Impact: Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities. \n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with Insight Control Suite For Linux (ICE-LX). The vulnerabilities could be remotely exploited to allow Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS) and other vulnerabilities. \n\nReferences: CVE-2009-2677, CVE-2009-0590, CVE-2009-1272, CVE-2008-5161, CVE-2008-4309, CVE-2008-1720\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nInsight Control Suite For Linux (ICE-LX) v2.10 or earlier\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2009-2677 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.4\nCVE-2009-0590 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2009-1272 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2008-5161 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6\nCVE-2008-4309 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2008-1720 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following updated product kit available to resolve the vulnerabilities. The HP ICE-LX v2.11 kit is available as described below. \n\nThe update file is HP_ICE_LX_V2.11_511708_004.iso which can be downloaded from here: https://h20392.www2.hp.com/portal/swdepot/try.do?productNumber=HPICELX\n\nThe kit can also be obtained by going to http://www.hp.com/go/ice-lx\n\nOpen Source packages updated in this version (v2.11) of ICE-LX\n\nnet-snmp-5.4.2.1\n\nphp 5.2.9\n\nrsync 3.0.5\n\nopenssh 5.2 p1\n\nopenssl-0.9.8k\n\nPRODUCT SPECIFIC INFORMATION\nNone\n\nHISTORY\nVersion:1 (rev.1) 12 August 2009 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\nCopyright 2009 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. The Common\nVulnerabilities and Exposures project identifies the following problems:\n \nCVE-2008-0960\n \n Wes Hardaker reported that the SNMPv3 HMAC verification relies on\n the client to specify the HMAC length, which allows spoofing of\n authenticated SNMPv3 packets. \n \nCVE-2008-2292\n \n John Kortink reported a buffer overflow in the __snprint_value\n function in snmp_get causing a denial of service and potentially\n allowing the execution of arbitrary code via a large OCTETSTRING \n in an attribute value pair (AVP). \n\nFor the stable distribution (etch), these problems has been fixed in\nversion 5.2.3-7etch4. \n \nFor the testing distribution (lenny) and unstable distribution (sid)\nthese problems have been fixed in version 5.4.1~dfsg-11. \n\nWe recommend that you upgrade your net-snmp package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz\n Size/MD5 checksum: 94030 2ccd6191c3212980956c30de392825ec\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc\n Size/MD5 checksum: 1046 8018cc23033178515298d5583a74f9ff\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz\n Size/MD5 checksum: 4006389 ba4bc583413f90618228d0f196da8181\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb\n Size/MD5 checksum: 1214368 d579d8f28f3d704b6c09b2b480425086\n http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb\n Size/MD5 checksum: 855594 b5ccd827adbcefcca3557fa9ae28cc08\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 2169470 265835564ef2b0e2e86a08000461c53b\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 944098 5b903886ee4740842715797e3231602c\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 1901802 5486eb1f2a5b076e5342b1dd9cbb12e2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 933202 e3210ba1641079e0c3aaf4a50e89aedd\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 835584 b14db8c5e5b5e2d34799952975f903fb\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 932008 fc79672bf64eaabd41ed1c2f4a42c7da\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 1890766 ae3832515a97a79b31e0e7f0316356ee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 835088 62867e9ba9dfca3c7e8ae575d5a478f5\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 918844 d2d1bc5f555bc9dba153e2a9a964ffbf\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 1557924 5c2a33a015dd44708a9cc7602ca2525c\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 909974 4c1cef835efc0b7ff3fea54a618eabee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 835284 3ac835d926481c9e0f589b578455ddee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 928252 b98e98b58c61be02e477185293427d5c\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 1778292 b903adf3d1fa6e7a26f7cafb7bffdd6b\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 1344158 78b6cf6b2974983e8e3670468da73cd1\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 835940 9eeaf116e386dd7733ab2106c662dfa9\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 1809132 78bb5f1c12b004d32fa265e6bd99ffa1\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 1926116 71c7f3095ffe1bb22e84ade21f32b3a4\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 935434 85deac8531b02a0fdf3c9baa21d8e4bd\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 935640 958cb158264f75772864cd5d5c0bf251\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 1423294 f05c7491a8100684c5085588738f05b5\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 833970 cb705c9fe9418cc9348ac935ea7b0ba2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 920070 3df41a0c99c41d1bccf6801011cf8ed5\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 925914 159b4244ef701edbe0fb8c9685b5b477\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 1838900 3b7ac7b8fe0da1a3909ee56aba46d464\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 2205680 6868a56b1db04627e6921bf7237939a2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 970440 783f0cccabfbcc63590730b3803d164d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 2281114 fd04b505755a3aed0fe4c9baaac84500\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 842690 9f9ca89c3d3ba7c46481e9cd39c242a6\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 962854 c8a32f808d719357a5b6350e2b60794e\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 895414 5dd919d188291cb3727d39b5e06c9e26\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 927342 28c245db4d8ea82ba4075b27d674d72a\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 833182 0e0b21e13d77de82bed7a38d30f65e4b\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 1769524 24bdc73a3d20c4046c7741957442c713\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 1717562 977ae5c34a127d32d8f2bf222de9a431\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 1755032 cab5c112911465a9ce23a0d2ea44ded9\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 926616 2bf14a3fe74d9f2a523aacc8b04f5282\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 895194 b7c9ed37bf83ad92371f5472ac5d917b\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 833098 08b63ba6c3becf25ba2f941a532a7b71\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 1720642 1ff7568eb478edee923edb76cf42e9ac\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 941434 bbac9384bd7f88339e2b86fa665208c1\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 835212 4790d79f8de7f1bee7aabf0473f25268\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 1657890 b91fcf52e80c7196cea0c13df9ac79ef\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 1803262 4d298c9509941390c7b2eb68320ad211\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 928170 b17966a6a61313344ac827b58f32eeef\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 1409718 2a128cbdce2522ef49604255cff41af2\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 931452 d3bb7c3a849cd2b35fa6e4acb19c318d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 1834914 67e5b946df18b06b41b3e108d5ddc4e3\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 836102 7a4b85e8ea0e50d7213997b5f7d6309f\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 903864 3f80e78e4e2672aacf3da0690ff24b79\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 925336 5824ea607689f3f1bd62a9e6e28f95ae\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 1548630 1378d1cf730d3026bc1f01a4ab2ccedb\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 918592 28a086f6aa2ee8d510b38c1a177843fc\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 834186 068cbf2b4774ecf9504b820db26e6f1d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 1782014 d39fae5fe0d1397a2a1bd7397d6e850a\n\n\n These files will probably be moved into the stable distribution on\n its next update",
"sources": [
{
"db": "NVD",
"id": "CVE-2008-4309"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"db": "VULMON",
"id": "CVE-2008-4309"
},
{
"db": "PACKETSTORM",
"id": "74204"
},
{
"db": "PACKETSTORM",
"id": "71588"
},
{
"db": "PACKETSTORM",
"id": "86380"
},
{
"db": "PACKETSTORM",
"id": "96766"
},
{
"db": "PACKETSTORM",
"id": "74528"
},
{
"db": "PACKETSTORM",
"id": "71612"
},
{
"db": "PACKETSTORM",
"id": "80339"
},
{
"db": "PACKETSTORM",
"id": "71748"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2008-4309",
"trust": 2.7
},
{
"db": "BID",
"id": "32020",
"trust": 1.9
},
{
"db": "SECUNIA",
"id": "32560",
"trust": 1.9
},
{
"db": "SECUNIA",
"id": "35679",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "33821",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "33003",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "32711",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "32539",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "33746",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "33631",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "33095",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "35074",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "32664",
"trust": 1.1
},
{
"db": "USCERT",
"id": "TA09-133A",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2008/10/31/1",
"trust": 1.1
},
{
"db": "VUPEN",
"id": "ADV-2009-1771",
"trust": 1.0
},
{
"db": "VUPEN",
"id": "ADV-2009-0301",
"trust": 1.0
},
{
"db": "VUPEN",
"id": "ADV-2008-3400",
"trust": 1.0
},
{
"db": "VUPEN",
"id": "ADV-2008-2973",
"trust": 1.0
},
{
"db": "VUPEN",
"id": "ADV-2009-1297",
"trust": 1.0
},
{
"db": "SECTRACK",
"id": "1021129",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001912",
"trust": 0.8
},
{
"db": "VUPEN",
"id": "2009/0301",
"trust": 0.1
},
{
"db": "VUPEN",
"id": "2008/2973",
"trust": 0.1
},
{
"db": "VUPEN",
"id": "2009/1771",
"trust": 0.1
},
{
"db": "VUPEN",
"id": "2008/3400",
"trust": 0.1
},
{
"db": "VUPEN",
"id": "2009/1297",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2008-4309",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "74204",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "71588",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "86380",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "96766",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "74528",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "71612",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "80339",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "71748",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-4309"
},
{
"db": "PACKETSTORM",
"id": "74204"
},
{
"db": "PACKETSTORM",
"id": "71588"
},
{
"db": "PACKETSTORM",
"id": "86380"
},
{
"db": "PACKETSTORM",
"id": "96766"
},
{
"db": "PACKETSTORM",
"id": "74528"
},
{
"db": "PACKETSTORM",
"id": "71612"
},
{
"db": "PACKETSTORM",
"id": "80339"
},
{
"db": "PACKETSTORM",
"id": "71748"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"db": "NVD",
"id": "CVE-2008-4309"
}
]
},
"id": "VAR-200810-0643",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.4467253
},
"last_update_date": "2025-12-22T20:18:57.941000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HT4298",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT4298"
},
{
"title": "HT3549",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3549"
},
{
"title": "HT4298",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT4298?viewlocale=ja_JP"
},
{
"title": "HT3549",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3549?viewlocale=ja_JP"
},
{
"title": "net-snmp-5.3.1-24.2",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=370"
},
{
"title": "1364",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1364"
},
{
"title": "882903",
"trust": 0.8,
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"title": "17272",
"trust": 0.8,
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev\u0026revision=17272"
},
{
"title": "RHSA-2008:0971",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2008-0971.html"
},
{
"title": "262908",
"trust": 0.8,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-262908-1"
},
{
"title": "RHSA-2008:0971",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0971J.html"
},
{
"title": "Red Hat: Important: net-snmp security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20080971 - Security Advisory"
},
{
"title": "Debian CVElist Bug Report Logs: snmpd: DoS in getbulk handling code in net-snmp",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=62361f00053b31a6e287f8cdbab522bc"
},
{
"title": "Debian CVElist Bug Report Logs: CVE-2008-6123: Access restriction bypass",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3c8a3056506c3b0fcd60cc70f0ff94c5"
},
{
"title": "Ubuntu Security Notice: net-snmp vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-685-1"
},
{
"title": "Debian Security Advisories: DSA-1663-1 net-snmp -- several vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=61d231c8116737565b9155223d52d04c"
},
{
"title": "VMware Security Advisories: VMSA-2010-0003.1 ESX Service Console update for net-snmp",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=118460cedfd75dcd7f03f597c97a9f86"
},
{
"title": "VMware Security Advisories: ESX patches address an issue loading corrupt virtual disks and update Service Console packages",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=7061f6121847e751e6c7d427a8dcc3e9"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-4309"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"db": "NVD",
"id": "CVE-2008-4309"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://www.securityfocus.com/bid/32020"
},
{
"trust": 1.9,
"url": "http://secunia.com/advisories/32560"
},
{
"trust": 1.2,
"url": "http://security.gentoo.org/glsa/glsa-200901-15.xml"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2008/10/31/1"
},
{
"trust": 1.1,
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272"
},
{
"trust": 1.1,
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"trust": 1.1,
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/32711"
},
{
"trust": 1.1,
"url": "http://wiki.rpath.com/wiki/advisories:rpsa-2008-0315"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/32664"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/33631"
},
{
"trust": 1.1,
"url": "http://www.vmware.com/security/advisories/vmsa-2009-0001.html"
},
{
"trust": 1.1,
"url": "http://www.redhat.com/support/errata/rhsa-2008-0971.html"
},
{
"trust": 1.1,
"url": "http://support.avaya.com/elmodocs2/security/asa-2008-467.htm"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/33821"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/32539"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id?1021129"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/33095"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/33003"
},
{
"trust": 1.1,
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/33746"
},
{
"trust": 1.1,
"url": "http://www.us-cert.gov/cas/techalerts/ta09-133a.html"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"trust": 1.1,
"url": "http://support.apple.com/kb/ht3549"
},
{
"trust": 1.1,
"url": "http://lists.apple.com/archives/security-announce/2009/may/msg00002.html"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/35074"
},
{
"trust": 1.1,
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/35679"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2009/1771"
},
{
"trust": 1.1,
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"trust": 1.1,
"url": "http://lists.apple.com/archives/security-announce/2010//dec/msg00001.html"
},
{
"trust": 1.1,
"url": "http://support.apple.com/kb/ht4298"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2009/0301"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/3400"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2008/2973"
},
{
"trust": 1.1,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:225"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9860"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6353"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6171"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4309"
},
{
"trust": 0.8,
"url": "http://www.frsirt.com/english/advisories/2008/2973"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu545319"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4309"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4309"
},
{
"trust": 0.2,
"url": "http://secunia.com/"
},
{
"trust": 0.2,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.2,
"url": "http://www.vmware.com/security"
},
{
"trust": 0.2,
"url": "http://www.vmware.com/support/policies/security_response.html"
},
{
"trust": 0.2,
"url": "http://kb.vmware.com/kb/1055"
},
{
"trust": 0.2,
"url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
},
{
"trust": 0.2,
"url": "http://www.vmware.com/support/policies/eos_vi.html"
},
{
"trust": 0.2,
"url": "http://www.vmware.com/support/policies/eos.html"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2008:0971"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/685-1/"
},
{
"trust": 0.1,
"url": "http://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4309"
},
{
"trust": 0.1,
"url": "http://bugs.pardus.org.tr/show_bug.cgi?id=8577"
},
{
"trust": 0.1,
"url": "http://security.pardus.org.tr"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1887"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1887"
},
{
"trust": 0.1,
"url": "http://enigmail.mozdev.org/"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx350-201002401-sg.zip"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1017660"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-2189"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-1804"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-0039"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1574"
},
{
"trust": 0.1,
"url": "http://support.apple.com/kb/ht1222"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx350-200901409-sg.zip"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1006659"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1006660"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4226"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1006661"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1007674.tgz"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4225"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx303-200901406-sg.zip"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-4914"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1007673"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esxe350-200901401-o-sg.zip"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1007682"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx303-200901405-sg.zip"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4225"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4226"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1006651"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx350-200901401-sg.zip"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1007681"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx-1007673.tgz"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4914"
},
{
"trust": 0.1,
"url": "http://download3.vmware.com/software/vi/esx350-200901410-sg.zip"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1007674"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.1,
"url": "http://www.hp.com/go/ice-lx"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-2677"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1720"
},
{
"trust": 0.1,
"url": "http://www.itrc.hp.com/service/cki/secbullarchive.do"
},
{
"trust": 0.1,
"url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc"
},
{
"trust": 0.1,
"url": "https://h20392.www2.hp.com/portal/swdepot/try.do?productnumber=hpicelx"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-5161"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1272"
},
{
"trust": 0.1,
"url": "http://h30046.www3.hp.com/subsignin.php"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-0590"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0960"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2292"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://packages.debian.org/\u003cpkg\u003e"
},
{
"trust": 0.1,
"url": "http://security.debian.org/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2008-4309"
},
{
"db": "PACKETSTORM",
"id": "74204"
},
{
"db": "PACKETSTORM",
"id": "71588"
},
{
"db": "PACKETSTORM",
"id": "86380"
},
{
"db": "PACKETSTORM",
"id": "96766"
},
{
"db": "PACKETSTORM",
"id": "74528"
},
{
"db": "PACKETSTORM",
"id": "71612"
},
{
"db": "PACKETSTORM",
"id": "80339"
},
{
"db": "PACKETSTORM",
"id": "71748"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"db": "NVD",
"id": "CVE-2008-4309"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2008-4309"
},
{
"db": "PACKETSTORM",
"id": "74204"
},
{
"db": "PACKETSTORM",
"id": "71588"
},
{
"db": "PACKETSTORM",
"id": "86380"
},
{
"db": "PACKETSTORM",
"id": "96766"
},
{
"db": "PACKETSTORM",
"id": "74528"
},
{
"db": "PACKETSTORM",
"id": "71612"
},
{
"db": "PACKETSTORM",
"id": "80339"
},
{
"db": "PACKETSTORM",
"id": "71748"
},
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"db": "NVD",
"id": "CVE-2008-4309"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-10-31T00:00:00",
"db": "VULMON",
"id": "CVE-2008-4309"
},
{
"date": "2009-01-21T22:37:48",
"db": "PACKETSTORM",
"id": "74204"
},
{
"date": "2008-11-05T07:45:59",
"db": "PACKETSTORM",
"id": "71588"
},
{
"date": "2010-02-16T22:59:32",
"db": "PACKETSTORM",
"id": "86380"
},
{
"date": "2010-12-17T07:46:59",
"db": "PACKETSTORM",
"id": "96766"
},
{
"date": "2009-02-01T19:57:26",
"db": "PACKETSTORM",
"id": "74528"
},
{
"date": "2008-11-06T00:23:18",
"db": "PACKETSTORM",
"id": "71612"
},
{
"date": "2009-08-15T00:45:19",
"db": "PACKETSTORM",
"id": "80339"
},
{
"date": "2008-11-09T21:15:50",
"db": "PACKETSTORM",
"id": "71748"
},
{
"date": "2008-12-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"date": "2008-10-31T20:29:09.497000",
"db": "NVD",
"id": "CVE-2008-4309"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-11T00:00:00",
"db": "VULMON",
"id": "CVE-2008-4309"
},
{
"date": "2011-01-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2008-001912"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2008-4309"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "71588"
},
{
"db": "PACKETSTORM",
"id": "86380"
},
{
"db": "PACKETSTORM",
"id": "71612"
},
{
"db": "PACKETSTORM",
"id": "80339"
},
{
"db": "PACKETSTORM",
"id": "71748"
}
],
"trust": 0.5
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "net-snmp of netsnmp_create_subtree_cache Integer overflow vulnerability in functions",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2008-001912"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "overflow",
"sources": [
{
"db": "PACKETSTORM",
"id": "74204"
}
],
"trust": 0.1
}
}
FKIE_CVE-2008-4309
Vulnerability from fkie_nvd - Published: 2008-10-31 20:29 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | ||
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=125017764422557&w=2 | ||
| secalert@redhat.com | http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271&r2=17272&pathrev=17272 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/32539 | ||
| secalert@redhat.com | http://secunia.com/advisories/32560 | ||
| secalert@redhat.com | http://secunia.com/advisories/32664 | ||
| secalert@redhat.com | http://secunia.com/advisories/32711 | ||
| secalert@redhat.com | http://secunia.com/advisories/33003 | ||
| secalert@redhat.com | http://secunia.com/advisories/33095 | ||
| secalert@redhat.com | http://secunia.com/advisories/33631 | ||
| secalert@redhat.com | http://secunia.com/advisories/33746 | ||
| secalert@redhat.com | http://secunia.com/advisories/33821 | ||
| secalert@redhat.com | http://secunia.com/advisories/35074 | ||
| secalert@redhat.com | http://secunia.com/advisories/35679 | ||
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200901-15.xml | ||
| secalert@redhat.com | http://sourceforge.net/forum/forum.php?forum_id=882903 | ||
| secalert@redhat.com | http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1 | ||
| secalert@redhat.com | http://support.apple.com/kb/HT3549 | ||
| secalert@redhat.com | http://support.apple.com/kb/HT4298 | ||
| secalert@redhat.com | http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm | ||
| secalert@redhat.com | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315 | ||
| secalert@redhat.com | http://www.debian.org/security/2008/dsa-1663 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2008:225 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2008/10/31/1 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2008-0971.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/498280/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/32020 | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1021129 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-685-1 | ||
| secalert@redhat.com | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | US Government Resource | |
| secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2009-0001.html | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/2973 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/3400 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/0301 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1297 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1771 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/46262 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=125017764422557&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271&r2=17272&pathrev=17272 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32539 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32560 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32664 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32711 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33003 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33095 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33631 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33746 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33821 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35074 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35679 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200901-15.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/forum/forum.php?forum_id=882903 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3549 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4298 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1663 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:225 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/10/31/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0971.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/498280/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/32020 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1021129 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-685-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2973 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/3400 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0301 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1297 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1771 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/46262 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:net-snmp:net-snmp:5.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F129CD3-B1ED-4FF4-8A86-2F76898E8915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:net-snmp:net-snmp:5.3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53505415-38BE-4EDC-824E-B64B5BF5B0D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:net-snmp:net-snmp:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "950BC4AA-60A3-4512-A452-F205FF843C29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats."
},
{
"lang": "es",
"value": "El c\u00f3digo getbulk en net-snmp 5.4 antes de v5.4.2.1, 5.3 antes de v5.3.2.3, y 5.2 antes de v5.2.5.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores relacionados con el n\u00famero de respuestas o repeticiones."
}
],
"id": "CVE-2008-4309",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-10-31T20:29:09.497",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32539"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32560"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32664"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/32711"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/33003"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/33095"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/33631"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/33746"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/33821"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35074"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/35679"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200901-15.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"source": "secalert@redhat.com",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT3549"
},
{
"source": "secalert@redhat.com",
"url": "http://support.apple.com/kb/HT4298"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm"
},
{
"source": "secalert@redhat.com",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2008/10/31/1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/32020"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1021129"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/2973"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/3400"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/0301"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2009/1771"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32539"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32560"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32711"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/33003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/33095"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/33631"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/33746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/33821"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35074"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35679"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200901-15.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3549"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT4298"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2008/10/31/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/32020"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1021129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2973"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/3400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/0301"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/1771"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2008-4309
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2008-4309",
"description": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.",
"id": "GSD-2008-4309",
"references": [
"https://www.suse.com/security/cve/CVE-2008-4309.html",
"https://www.debian.org/security/2008/dsa-1663",
"https://access.redhat.com/errata/RHSA-2008:0971",
"https://linux.oracle.com/cve/CVE-2008-4309.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-4309"
],
"details": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.",
"id": "GSD-2008-4309",
"modified": "2023-12-13T01:22:59.689703Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-4309",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"name": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"name": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272",
"refsource": "MISC",
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272"
},
{
"name": "http://secunia.com/advisories/32539",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32539"
},
{
"name": "http://secunia.com/advisories/32560",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32560"
},
{
"name": "http://secunia.com/advisories/32664",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32664"
},
{
"name": "http://secunia.com/advisories/32711",
"refsource": "MISC",
"url": "http://secunia.com/advisories/32711"
},
{
"name": "http://secunia.com/advisories/33003",
"refsource": "MISC",
"url": "http://secunia.com/advisories/33003"
},
{
"name": "http://secunia.com/advisories/33095",
"refsource": "MISC",
"url": "http://secunia.com/advisories/33095"
},
{
"name": "http://secunia.com/advisories/33631",
"refsource": "MISC",
"url": "http://secunia.com/advisories/33631"
},
{
"name": "http://secunia.com/advisories/33746",
"refsource": "MISC",
"url": "http://secunia.com/advisories/33746"
},
{
"name": "http://secunia.com/advisories/33821",
"refsource": "MISC",
"url": "http://secunia.com/advisories/33821"
},
{
"name": "http://secunia.com/advisories/35074",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35074"
},
{
"name": "http://secunia.com/advisories/35679",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35679"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200901-15.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200901-15.xml"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=882903",
"refsource": "MISC",
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1",
"refsource": "MISC",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "http://support.apple.com/kb/HT4298",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT4298"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm",
"refsource": "MISC",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315",
"refsource": "MISC",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315"
},
{
"name": "http://www.debian.org/security/2008/dsa-1663",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225"
},
{
"name": "http://www.openwall.com/lists/oss-security/2008/10/31/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2008/10/31/1"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0971.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html"
},
{
"name": "http://www.securityfocus.com/archive/1/498280/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/32020",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/32020"
},
{
"name": "http://www.securitytracker.com/id?1021129",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1021129"
},
{
"name": "http://www.ubuntu.com/usn/usn-685-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"name": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
"refsource": "MISC",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html",
"refsource": "MISC",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html"
},
{
"name": "http://www.vupen.com/english/advisories/2008/2973",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/2973"
},
{
"name": "http://www.vupen.com/english/advisories/2008/3400",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/3400"
},
{
"name": "http://www.vupen.com/english/advisories/2009/0301",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/0301"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1297",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1771",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1771"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:net-snmp:net-snmp:5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:net-snmp:net-snmp:5.3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:net-snmp:net-snmp:5.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-4309"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20081031 New net-snmp DoS",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2008/10/31/1"
},
{
"name": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=882903",
"refsource": "CONFIRM",
"tags": [],
"url": "http://sourceforge.net/forum/forum.php?forum_id=882903"
},
{
"name": "32020",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/32020"
},
{
"name": "DSA-1663",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1663"
},
{
"name": "32711",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32711"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315"
},
{
"name": "32664",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32664"
},
{
"name": "33631",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/33631"
},
{
"name": "GLSA-200901-15",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200901-15.xml"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html"
},
{
"name": "RHSA-2008:0971",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html"
},
{
"name": "32560",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32560"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm"
},
{
"name": "SUSE-SR:2009:003",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"name": "33821",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/33821"
},
{
"name": "32539",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/32539"
},
{
"name": "1021129",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1021129"
},
{
"name": "33095",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/33095"
},
{
"name": "33003",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/33003"
},
{
"name": "USN-685-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-685-1"
},
{
"name": "33746",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/33746"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "ADV-2009-1297",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "35074",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35074"
},
{
"name": "262908",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1"
},
{
"name": "35679",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35679"
},
{
"name": "ADV-2009-1771",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/1771"
},
{
"name": "HPSBMA02447",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
},
{
"name": "APPLE-SA-2010-12-16-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT4298",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT4298"
},
{
"name": "ADV-2009-0301",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/0301"
},
{
"name": "ADV-2008-3400",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/3400"
},
{
"name": "ADV-2008-2973",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/2973"
},
{
"name": "MDVSA-2008:225",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225"
},
{
"name": "netsnmp-netsnmpcreatesubtreecache-dos(46262)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262"
},
{
"name": "oval:org.mitre.oval:def:9860",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860"
},
{
"name": "oval:org.mitre.oval:def:6353",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353"
},
{
"name": "oval:org.mitre.oval:def:6171",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171"
},
{
"name": "20081112 rPSA-2008-0315-1 net-snmp net-snmp-client net-snmp-server net-snmp-utils",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:19Z",
"publishedDate": "2008-10-31T20:29Z"
}
}
}
RHSA-2008:0971
Vulnerability from csaf_redhat - Published: 2008-11-03 14:53 - Updated: 2025-11-21 17:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated net-snmp packages that fix a security issue are now available for\nRed Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Simple Network Management Protocol (SNMP) is a protocol used for\nnetwork management.\n\nA denial-of-service flaw was found in the way Net-SNMP processes SNMP\nGETBULK requests. A remote attacker who issued a specially-crafted request\ncould cause the snmpd server to crash. (CVE-2008-4309)\n\nNote: An attacker must have read access to the SNMP server in order to\nexploit this flaw. In the default configuration, the community name\n\"public\" grants read-only access. In production deployments, it is\nrecommended to change this default community name.\n\nAll users of net-snmp should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.\n",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0971",
"url": "https://access.redhat.com/errata/RHSA-2008:0971"
},
{
"category": "external",
"summary": "469349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=469349"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0971.json"
}
],
"title": "Red Hat Security Advisory: net-snmp security update",
"tracking": {
"current_release_date": "2025-11-21T17:33:57+00:00",
"generator": {
"date": "2025-11-21T17:33:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2008:0971",
"initial_release_date": "2008-11-03T14:53:00+00:00",
"revision_history": [
{
"date": "2008-11-03T14:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-11-03T10:23:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:33:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.25.ia64",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.25.ia64",
"product_id": "net-snmp-0:5.0.9-2.30E.25.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"product": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-13.el4_7.2.ia64",
"product": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ia64",
"product_id": "net-snmp-0:5.1.2-13.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"product": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"product": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"product": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.2.ia64",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.ia64",
"product_id": "net-snmp-1:5.3.1-24.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.25.i386",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.i386",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.25.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.25.i386",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.i386",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.25.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.25.i386",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.i386",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.25.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.25.i386",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.25.i386",
"product_id": "net-snmp-0:5.0.9-2.30E.25.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.25.i386",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.i386",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.25.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"product": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"product": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-13.el4_7.2.i386",
"product": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.i386",
"product_id": "net-snmp-0:5.1.2-13.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"product": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"product": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.2.i386",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.i386",
"product_id": "net-snmp-1:5.3.1-24.el5_2.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.25.x86_64",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.25.x86_64",
"product_id": "net-snmp-0:5.0.9-2.30E.25.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"product": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"product": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"product_id": "net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"product": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"product": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"product": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"product_id": "net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.25.src",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.25.src",
"product_id": "net-snmp-0:5.0.9-2.30E.25.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=src"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-13.el4_7.2.src",
"product": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.src",
"product_id": "net-snmp-0:5.1.2-13.el4_7.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.2.src",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.src",
"product_id": "net-snmp-1:5.3.1-24.el5_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.25.ppc",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.25.ppc",
"product_id": "net-snmp-0:5.0.9-2.30E.25.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"product": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-13.el4_7.2.ppc",
"product": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ppc",
"product_id": "net-snmp-0:5.1.2-13.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"product": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"product": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"product": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.2.ppc",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.ppc",
"product_id": "net-snmp-1:5.3.1-24.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"product": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.25.s390x",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390x",
"product_id": "net-snmp-0:5.0.9-2.30E.25.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"product": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390x",
"product": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390x",
"product_id": "net-snmp-0:5.1.2-13.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"product": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"product": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"product": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"product": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"product": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-1:5.3.1-24.el5_2.2.s390x",
"product": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.s390x",
"product_id": "net-snmp-1:5.3.1-24.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"product": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390",
"product": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390",
"product_id": "net-snmp-libs-0:5.0.9-2.30E.25.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390",
"product": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390",
"product_id": "net-snmp-utils-0:5.0.9-2.30E.25.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390",
"product": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390",
"product_id": "net-snmp-devel-0:5.0.9-2.30E.25.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.0.9-2.30E.25.s390",
"product": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390",
"product_id": "net-snmp-0:5.0.9-2.30E.25.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390",
"product": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390",
"product_id": "net-snmp-perl-0:5.0.9-2.30E.25.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"product": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"product": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"product": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390",
"product": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390",
"product_id": "net-snmp-0:5.1.2-13.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"product": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"product": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"product": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"product": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"product": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.src"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.src"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.src"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.src"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.i386"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.ia64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.ppc"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390x"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64"
},
"product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.src"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.src"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.src"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.src"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64"
},
"product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.src"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.src"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.src"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.i386"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64"
},
"product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-4309",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-10-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "469349"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net-snmp: numresponses calculation integer overflow in snmp_agent.c",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:net-snmp-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-0:5.0.9-2.30E.25.src",
"3AS:net-snmp-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.src",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-0:5.0.9-2.30E.25.src",
"3ES:net-snmp-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-0:5.0.9-2.30E.25.src",
"3WS:net-snmp-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.src",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.src",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.src",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.src",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.src",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.src",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.src",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-4309"
},
{
"category": "external",
"summary": "RHBZ#469349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=469349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4309",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4309"
}
],
"release_date": "2008-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-11-03T14:53:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:net-snmp-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-0:5.0.9-2.30E.25.src",
"3AS:net-snmp-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.i386",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"3AS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.src",
"3Desktop:net-snmp-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.i386",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-0:5.0.9-2.30E.25.src",
"3ES:net-snmp-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.i386",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"3ES:net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-0:5.0.9-2.30E.25.src",
"3WS:net-snmp-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.i386",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.ia64",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.ppc",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390x",
"3WS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.src",
"4AS:net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.src",
"4Desktop:net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.src",
"4ES:net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.src",
"4WS:net-snmp-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x",
"4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.src",
"5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.src",
"5Client:net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.src",
"5Server:net-snmp-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.i386",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x",
"5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0971"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "net-snmp: numresponses calculation integer overflow in snmp_agent.c"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.