ID

VAR-200505-1240


CVE

CVE-2005-1280


TITLE

OpenSSL SSLv2 client code fails to properly check for NULL

Trust: 0.8

sources: CERT/CC: VU#386964

DESCRIPTION

The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4. The gzip program contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code or create a denial-of-service condition. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ tcpdump Is a management tool for capturing network traffic and supports multiple protocols. The issue occurs because of the way tcpdump decodes Resource ReSerVation Protocol (RSVP) packets. This issue affects tcpdump 3.9.x/CVS and earlier. This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig72CF56A4065A77499C855538 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable --------------------------------------------------------------------- Fedora Legacy Update Advisory Synopsis: Updated tcpdump packages fix security issues Advisory ID: FLSA:156139 Issue date: 2006-04-04 Product: Red Hat Linux, Fedora Core Keywords: Bugfix, Security CVE Names: CVE-2005-1267, CVE-2005-1278, CVE-2005-1279, CVE-2005-1280 --------------------------------------------------------------------- --------------------------------------------------------------------- 1. Topic: Updated tcpdump packages that fix several security issues are now available. 2. Relevant releases/architectures: Red Hat Linux 9 - i386 Fedora Core 1 - i386 Fedora Core 2 - i386 3. Problem description: Several denial of service bugs were found in the way tcpdump processes certain network packets. It is possible for an attacker to inject a carefully crafted packet onto the network, crashing a running tcpdump session. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2005-1267, CVE-2005-1278, CVE-2005-1279, and CVE-2005-1280 to these issues. Users of tcpdump are advised to upgrade to these erratum packages, which contain backported security patches and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www.fedoralegacy.org/docs for directions on how to configure yum and apt-get. 5. Bug IDs fixed: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=3D156139 6. RPMs required: Red Hat Linux 9: SRPM: http://download.fedoralegacy.org/redhat/9/updates/SRPMS/tcpdump-3.7.2-7.9= =2E4.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/9/updates/i386/tcpdump-3.7.2-7.9.= 4.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/libpcap-0.7.2-7.9.= 4.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/arpwatch-2.1a11-7.= 9.4.legacy.i386.rpm Fedora Core 1: SRPM: http://download.fedoralegacy.org/fedora/1/updates/SRPMS/tcpdump-3.7.2-8.f= c1.3.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/1/updates/i386/tcpdump-3.7.2-8.fc= 1.3.legacy.i386.rpm http://download.fedoralegacy.org/fedora/1/updates/i386/libpcap-0.7.2-8.fc= 1.3.legacy.i386.rpm http://download.fedoralegacy.org/fedora/1/updates/i386/arpwatch-2.1a11-8.= fc1.3.legacy.i386.rpm Fedora Core 2: SRPM: http://download.fedoralegacy.org/fedora/2/updates/SRPMS/tcpdump-3.8.2-6.F= C2.3.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/2/updates/i386/tcpdump-3.8.2-6.FC= 2.3.legacy.i386.rpm http://download.fedoralegacy.org/fedora/2/updates/i386/libpcap-0.8.3-6.FC= 2.3.legacy.i386.rpm http://download.fedoralegacy.org/fedora/2/updates/i386/arpwatch-2.1a13-6.= FC2.3.legacy.i386.rpm 7. Verification: SHA1 sum Package Name --------------------------------------------------------------------- 0beccb4a6dd929174bc2d70d680a2e3c4a094391 redhat/9/updates/i386/tcpdump-3.7.2-7.9.4.legacy.i386.rpm 71e1ffc2c4dbf2a5c754630e198f17af94000e66 redhat/9/updates/i386/libpcap-0.7.2-7.9.4.legacy.i386.rpm 843a832974f531413a8e406491f6c91d09bda24d redhat/9/updates/i386/arpwatch-2.1a11-7.9.4.legacy.i386.rpm 192fa5bbebe8039f3c23b8aa26804d1c4b788412 redhat/9/updates/SRPMS/tcpdump-3.7.2-7.9.4.legacy.src.rpm 1a426b6225718dbd325fbe0c6d54f8904b710103 fedora/1/updates/i386/tcpdump-3.7.2-8.fc1.3.legacy.i386.rpm 45cffdb7d98c2eb03da004d89b776a7050ff5c40 fedora/1/updates/i386/libpcap-0.7.2-8.fc1.3.legacy.i386.rpm 75e263aa296969c873d0475cc1c0785c30ea24d6 fedora/1/updates/i386/arpwatch-2.1a11-8.fc1.3.legacy.i386.rpm 6e86c20a8af1fc607809c713d7ac00ab5e2f717c fedora/1/updates/SRPMS/tcpdump-3.7.2-8.fc1.3.legacy.src.rpm 32d0dcf31fbe12225954cc32dad45dbcb6c5f5e4 fedora/2/updates/i386/tcpdump-3.8.2-6.FC2.3.legacy.i386.rpm c84625e92600faa8566129c8229daa6c328dcee9 fedora/2/updates/i386/libpcap-0.8.3-6.FC2.3.legacy.i386.rpm dbdcbed104a6d3985a0735aab55031a3be0e1a74 fedora/2/updates/i386/arpwatch-2.1a13-6.FC2.3.legacy.i386.rpm bb98c4cd71507e4dec94da2c1c9f95ee9bbacde1 fedora/2/updates/SRPMS/tcpdump-3.8.2-6.FC2.3.legacy.src.rpm These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-1267 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-1278 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-1279 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-1280 9. Contact: The Fedora Legacy security contact is <secnotice@fedoralegacy.org>. More project details at http://www.fedoralegacy.org --------------------------------------------------------------------- --------------enig72CF56A4065A77499C855538 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEMxLYLMAs/0C4zNoRAk8xAJ4utHt2OOExJbd3DH8xtLyfe4YcyACeLsad ZdMzjYDTapqXGKau0WRk570= =BXab -----END PGP SIGNATURE----- --------------enig72CF56A4065A77499C855538-- . ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: gzip Multiple Vulnerabilities SECUNIA ADVISORY ID: SA21996 VERIFY ADVISORY: http://secunia.com/advisories/21996/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: gzip 1.x http://secunia.com/product/4220/ DESCRIPTION: Tavis Ormandy has reported some vulnerabilities in gzip, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. 1) A boundary error within the "make_table()" function in unlzh.c can be used to modify certain stack data. tricking a user or automated system into unpacking a specially crafted archive file. tricking a user or automated system into unpacking a specially crafted "pack" archive file. 3) A buffer overflow within the "make_table()" function of gzip's LZH support can be exploited to cause a DoS and potentially to compromise a vulnerable system by e.g. tricking a user or automated system into unpacking an archive containing a specially crafted decoding table. 4) A NULL pointer dereference within the "huft_build()" function and an infinite loop within the LZH handling can be exploited to cause a DoS by e.g. tricking a user or automated system into unpacking a specially crafted archive file. The vulnerabilities have been reported in version 1.3.5. Other versions may also be affected. SOLUTION: Do not unpack untrusted archive files. PROVIDED AND/OR DISCOVERED BY: Tavis Ormandy, Google Security Team ORIGINAL ADVISORY: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676 OTHER REFERENCES: US-CERT VU#554780: http://www.kb.cert.org/vuls/id/554780 US-CERT VU#381508: http://www.kb.cert.org/vuls/id/381508 US-CERT VU#773548: http://www.kb.cert.org/vuls/id/773548 US-CERT VU#933712: http://www.kb.cert.org/vuls/id/933712 US-CERT VU#596848 http://www.kb.cert.org/vuls/id/596848 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-333A Apple Releases Security Update to Address Multiple Vulnerabilities Original release date: November 29, 2006 Last revised: -- Source: US-CERT Systems Affected * Apple Mac OS X version 10.3.x and 10.4.x * Apple Mac OS X Server version 10.3.x and 10.4.x * Apple Safari web browser These vulnerabilities affect both Intel-based and PowerPC-based Apple systems. Overview Apple has released Security Update 2006-007 to correct multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser. Vulnerabilities in OpenSSL, gzip, and other products are also addressed. Description Apple Security Update 2006-007 addresses a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, and other products. Further details are available in the related vulnerability notes. This security update also addresses previously known vulnerabilities in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. II. Impact The impacts of these vulnerabilities vary. For specific details, see the appropriate vulnerability notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service. III. Solution Install updates Install Apple Security Update 2006-007. This and other updates are available via Apple Update or via Apple Downloads. IV. References * Vulnerability Notes for Apple Security Update 2006-007 - <http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007> * Vulnerability Notes for OpenSSL Security Advisory [28th September 2006] - <http://www.kb.cert.org/vuls/byid?searchview&query=openssl_secadv_20060928> * Vulnerability Note VU#845620 - <http://www.kb.cert.org/vuls/id/845620> * Vulnerability Note VU#933712 - <http://www.kb.cert.org/vuls/id/933712> * Vulnerability Note VU#381508 - <http://www.kb.cert.org/vuls/id/381508> * Vulnerability Note VU#554780 - <http://www.kb.cert.org/vuls/id/554780> * Vulnerability Note VU#596848 - <http://www.kb.cert.org/vuls/id/596848> * Vulnerability Note VU#773548 - <http://www.kb.cert.org/vuls/id/773548> * About the security content of Security Update 2006-007 - <http://docs.info.apple.com/article.html?artnum=304829> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> * Apple Downloads - <http://www.apple.com/support/downloads/> * OpenSSL: OpenSSL vulnerabilities - <http://www.openssl.org/news/vulnerabilities.html> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/#Safari> _________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-333A.html> _________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-333A Feedback VU#191336" in the subject. _________________________________________________________________ Produced 2006 by US-CERT, a government organization. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-analyzer/tcpdump < 3.8.3-r2 >= 3.8.3-r2 Description =========== TCPDump improperly handles and decodes ISIS, BGP, LDP (CAN-2005-1279) and RSVP (CAN-2005-1280) packets. TCPDump might loop endlessly after receiving malformed packets. Workaround ========== There is no known workaround at this time. Resolution ========== All TCPDump users should upgrade to the latest available version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-3.8.3-r2" References ========== [ 1 ] CAN-2005-1279 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1279 [ 2 ] CAN-2005-1280 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1280 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200505-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.0

Trust: 4.41

sources: NVD: CVE-2005-1280 // CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // JVNDB: JVNDB-2005-000283 // BID: 13390 // PACKETSTORM: 45250 // PACKETSTORM: 50178 // PACKETSTORM: 52708 // PACKETSTORM: 38413

AFFECTED PRODUCTS

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 2.4

vendor:freebsdmodel: - scope: - version: -

Trust: 2.4

vendor:red hatmodel: - scope: - version: -

Trust: 2.4

vendor:slackware linuxmodel: - scope: - version: -

Trust: 2.4

vendor:ubuntumodel: - scope: - version: -

Trust: 2.4

vendor:f5model: - scope: - version: -

Trust: 1.6

vendor:openpkgmodel: - scope: - version: -

Trust: 1.6

vendor:opensslmodel: - scope: - version: -

Trust: 1.6

vendor:oraclemodel: - scope: - version: -

Trust: 1.6

vendor:suse linuxmodel: - scope: - version: -

Trust: 1.6

vendor:rpathmodel: - scope: - version: -

Trust: 1.6

vendor:apple computermodel: - scope: - version: -

Trust: 1.6

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:lblmodel:tcpdumpscope:lteversion:3.9.1

Trust: 1.0

vendor:lblmodel:tcpdumpscope:eqversion:3.9.1

Trust: 0.9

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 0.8

vendor:appgate network securitymodel: - scope: - version: -

Trust: 0.8

vendor:attachmatewrqmodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:gnutlsmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:iaik java groupmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:internet consortiummodel: - scope: - version: -

Trust: 0.8

vendor:intotomodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:operamodel: - scope: - version: -

Trust: 0.8

vendor:rsa securitymodel: - scope: - version: -

Trust: 0.8

vendor:ssh security corpmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:sybasemodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:vandykemodel: - scope: - version: -

Trust: 0.8

vendor:internet initiativemodel:seil/b1scope:eqversion:2.00 ~ 2.40

Trust: 0.8

vendor:internet initiativemodel:seil/neuscope:eqversion:2fe plus 2.00 ~ 2.02

Trust: 0.8

vendor:internet initiativemodel:seil/turboscope:eqversion:2.00 ~ 2.02

Trust: 0.8

vendor:internet initiativemodel:seil/x1,x2scope:eqversion:2.10 ~ 2.40

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:7

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:8

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server workgroup editionscope:eqversion:1.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server hosting editionscope:eqversion:1.0

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.2

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.1

Trust: 0.3

vendor:trustixmodel:secure enterprise linuxscope:eqversion:2.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:susemodel:linux desktopscope:eqversion:1.0

Trust: 0.3

vendor:sgimodel:propackscope:eqversion:3.0

Trust: 0.3

vendor:scomodel:unixwarescope:eqversion:7.1.4

Trust: 0.3

vendor:scomodel:unixware upscope:eqversion:7.1.3

Trust: 0.3

vendor:scomodel:unixwarescope:eqversion:7.1.3

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:8.2

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:8.2

Trust: 0.3

vendor:redhatmodel:linux i386scope:eqversion:9.0

Trust: 0.3

vendor:redhatmodel:fedora core3scope: - version: -

Trust: 0.3

vendor:redhatmodel:fedora core2scope: - version: -

Trust: 0.3

vendor:redhatmodel:fedora core1scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:netbsdmodel:currentscope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:10.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:10.2

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:10.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:10.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake amd64scope:eqversion:10.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.9

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.8.3

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.8.2

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.8.1

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.7.2

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.7.1

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.7

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.6.3

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.6.2

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.5.2

Trust: 0.3

vendor:lblmodel:tcpdump alphascope:eqversion:3.5

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.5

Trust: 0.3

vendor:lblmodel:tcpdump a6scope:eqversion:3.4

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.5

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.2

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-release/alphascope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:-release-p14scope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.2

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.12

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.11

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.10

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.9

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.6

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.2

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.0

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.3

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.2

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.12

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.11

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.4

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.3

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:s8710 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8710 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:modular messagingscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:modular messagingscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:mn100scope: - version: -

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 0.3

vendor:f5model:big-ipscope:neversion:4.7

Trust: 0.3

vendor:f5model:big-ipscope:neversion:4.5.13

Trust: 0.3

vendor:f5model:3-dnsscope:neversion:4.7

Trust: 0.3

vendor:f5model:3-dnsscope:neversion:4.5.13

Trust: 0.3

sources: CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // BID: 13390 // JVNDB: JVNDB-2005-000283 // CNNVD: CNNVD-200505-090 // NVD: CVE-2005-1280

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-1280
value: MEDIUM

Trust: 1.8

CARNEGIE MELLON: VU#386964
value: 0.32

Trust: 0.8

CARNEGIE MELLON: VU#773548
value: 1.57

Trust: 0.8

CARNEGIE MELLON: VU#845620
value: 7.56

Trust: 0.8

CNNVD: CNNVD-200505-090
value: MEDIUM

Trust: 0.6

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2005-1280
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // JVNDB: JVNDB-2005-000283 // CNNVD: CNNVD-200505-090 // NVD: CVE-2005-1280

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-1280

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 52708 // CNNVD: CNNVD-200505-090

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200505-090

CONFIGURATIONS

sources: NVD: CVE-2005-1280

PATCH

title:257url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=257

Trust: 0.8

title:156040url:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=156040

Trust: 0.8

title:RHSA-2005:421url:https://rhn.redhat.com/errata/rhsa-2005-421.html

Trust: 0.8

title:RHSA-2005:417url:https://rhn.redhat.com/errata/rhsa-2005-417.html

Trust: 0.8

title:tcpdump コマンド実行時における脆弱性url:http://www.seil.jp/seilseries/security/2009/07061763.php

Trust: 0.8

title:TLSA-2005-63url:http://www.turbolinux.com/security/2005/tlsa-2005-63.txt

Trust: 0.8

title:RHSA-2005:417url:http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-417j.html

Trust: 0.8

title:RHSA-2005:421url:http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-421j.html

Trust: 0.8

title:TLSA-2005-63url:http://www.turbolinux.co.jp/security/2005/tlsa-2005-63j.txt

Trust: 0.8

sources: JVNDB: JVNDB-2005-000283

EXTERNAL IDS

db:NVDid:CVE-2005-1280

Trust: 2.9

db:BIDid:13390

Trust: 2.7

db:SECUNIAid:15125

Trust: 2.4

db:BIDid:22083

Trust: 1.6

db:SECUNIAid:18146

Trust: 1.6

db:CERT/CCid:VU#773548

Trust: 1.0

db:CERT/CCid:VU#845620

Trust: 0.9

db:SECUNIAid:23280

Trust: 0.8

db:SECUNIAid:23309

Trust: 0.8

db:BIDid:20246

Trust: 0.8

db:CERT/CCid:VU#386964

Trust: 0.8

db:AUSCERTid:ESB-2007.0014

Trust: 0.8

db:SECUNIAid:21709

Trust: 0.8

db:BIDid:13380

Trust: 0.8

db:BIDid:13389

Trust: 0.8

db:BIDid:13392

Trust: 0.8

db:JVNDBid:JVNDB-2005-000283

Trust: 0.8

db:FEDORAid:FLSA:156139

Trust: 0.6

db:BUGTRAQid:20050426 TCPDUMP(/ETHEREAL)[]: (RSVP) RSVP_PRINT() INFINITE LOOP DOS.

Trust: 0.6

db:REDHATid:RHSA-2005:417

Trust: 0.6

db:REDHATid:RHSA-2005:421

Trust: 0.6

db:SCOid:SCOSA-2005.60

Trust: 0.6

db:CNNVDid:CNNVD-200505-090

Trust: 0.6

db:CERT/CCid:VU#554780

Trust: 0.2

db:CERT/CCid:VU#933712

Trust: 0.2

db:CERT/CCid:VU#596848

Trust: 0.2

db:CERT/CCid:VU#381508

Trust: 0.2

db:SECUNIAid:21996

Trust: 0.2

db:PACKETSTORMid:45250

Trust: 0.1

db:PACKETSTORMid:50178

Trust: 0.1

db:USCERTid:TA06-333A

Trust: 0.1

db:PACKETSTORMid:52708

Trust: 0.1

db:PACKETSTORMid:38413

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // BID: 13390 // JVNDB: JVNDB-2005-000283 // PACKETSTORM: 45250 // PACKETSTORM: 50178 // PACKETSTORM: 52708 // PACKETSTORM: 38413 // CNNVD: CNNVD-200505-090 // NVD: CVE-2005-1280

REFERENCES

url:http://secunia.com/advisories/15125

Trust: 2.4

url:http://www.securityfocus.com/bid/13390

Trust: 2.4

url:http://www.securityfocus.com/bid/22083

Trust: 1.6

url:http://www.securityfocus.com/archive/1/396930

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2005-421.html

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2005-417.html

Trust: 1.6

url:http://secunia.com/advisories/18146

Trust: 1.6

url:ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.60/scosa-2005.60.txt

Trust: 1.6

url:http://www.securityfocus.com/archive/1/430292/100/0/threaded

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10732

Trust: 1.0

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23386964/index.html

Trust: 0.8

url:http://secunia.com/advisories/23280/

Trust: 0.8

url:http://secunia.com/advisories/23309/

Trust: 0.8

url:http://www.securityfocus.com/bid/20246

Trust: 0.8

url:http://www.gzip.org/

Trust: 0.8

url:http://www.auscert.org.au/7179

Trust: 0.8

url:http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

Trust: 0.8

url:http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 0.8

url:http://secunia.com/advisories/21709/

Trust: 0.8

url:http://www.rsasecurity.com/rsalabs/node.asp?id=2125

Trust: 0.8

url:http://www.ietf.org/rfc/rfc3447.txt

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-1280

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-1280

Trust: 0.8

url:http://www.securityfocus.com/bid/13392

Trust: 0.8

url:http://www.securityfocus.com/bid/13389

Trust: 0.8

url:http://www.securityfocus.com/bid/13380

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/430292/100/0/threaded

Trust: 0.6

url:http://support.avaya.com/elmodocs2/security/asa-2005-137_rhsa-2005-417_rhsa-2005-421.pdf

Trust: 0.3

url:http://www.ipcop.org/modules.php?op=modload&name=news&file=article&sid=21&mode=thread&order=0&thold=0

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2005-417.html

Trust: 0.3

url:http://tech.f5.com/home/bigip/solutions/advisories/sol4809.html

Trust: 0.3

url:http://www.tcpdump.org/

Trust: 0.3

url:/archive/1/396930

Trust: 0.3

url:/archive/1/396932

Trust: 0.3

url:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=3d156139

Trust: 0.1

url:http://download.fedoralegacy.org/redhat/9/updates/i386/libpcap-0.7.2-7.9.=

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/2/updates/i386/libpcap-0.8.3-6.fc=

Trust: 0.1

url:http://download.fedoralegacy.org/redhat/9/updates/srpms/tcpdump-3.7.2-7.9=

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/2/updates/i386/tcpdump-3.8.2-6.fc=

Trust: 0.1

url:http://www.fedoralegacy.org/about/security.php

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2005-1267

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/1/updates/i386/libpcap-0.7.2-8.fc=

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2005-1278

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/1/updates/srpms/tcpdump-3.7.2-8.f=

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/2/updates/i386/arpwatch-2.1a13-6.=

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/1/updates/i386/arpwatch-2.1a11-8.=

Trust: 0.1

url:http://download.fedoralegacy.org/redhat/9/updates/i386/arpwatch-2.1a11-7.=

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2005-1280

Trust: 0.1

url:http://www.fedoralegacy.org

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2005-1279

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/2/updates/srpms/tcpdump-3.8.2-6.f=

Trust: 0.1

url:http://www.fedoralegacy.org/docs

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/1/updates/i386/tcpdump-3.7.2-8.fc=

Trust: 0.1

url:http://download.fedoralegacy.org/redhat/9/updates/i386/tcpdump-3.7.2-7.9.=

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/554780

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/381508

Trust: 0.1

url:http://secunia.com/quality_assurance_analyst/

Trust: 0.1

url:http://secunia.com/product/4220/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/773548

Trust: 0.1

url:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/933712

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/596848

Trust: 0.1

url:http://secunia.com/advisories/21996/

Trust: 0.1

url:http://secunia.com/web_application_security_specialist/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/845620>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/773548>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/933712>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-333a.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/596848>

Trust: 0.1

url:http://www.openssl.org/news/vulnerabilities.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=304829>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/#safari>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/381508>

Trust: 0.1

url:http://www.apple.com/support/downloads/>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=openssl_secadv_20060928>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/554780>

Trust: 0.1

url:http://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-1280

Trust: 0.1

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1279

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-1279

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1280

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200505-06.xml

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // BID: 13390 // JVNDB: JVNDB-2005-000283 // PACKETSTORM: 45250 // PACKETSTORM: 50178 // PACKETSTORM: 52708 // PACKETSTORM: 38413 // CNNVD: CNNVD-200505-090 // NVD: CVE-2005-1280

CREDITS

Vade 79 v9@fakehalo.deadpig.org

Trust: 0.6

sources: CNNVD: CNNVD-200505-090

SOURCES

db:CERT/CCid:VU#386964
db:CERT/CCid:VU#773548
db:CERT/CCid:VU#845620
db:BIDid:13390
db:JVNDBid:JVNDB-2005-000283
db:PACKETSTORMid:45250
db:PACKETSTORMid:50178
db:PACKETSTORMid:52708
db:PACKETSTORMid:38413
db:CNNVDid:CNNVD-200505-090
db:NVDid:CVE-2005-1280

LAST UPDATE DATE

2024-04-30T22:12:15.006000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#386964date:2011-07-22T00:00:00
db:CERT/CCid:VU#773548date:2011-07-22T00:00:00
db:CERT/CCid:VU#845620date:2007-02-08T00:00:00
db:BIDid:13390date:2009-06-23T19:19:00
db:JVNDBid:JVNDB-2005-000283date:2009-08-10T00:00:00
db:CNNVDid:CNNVD-200505-090date:2005-10-20T00:00:00
db:NVDid:CVE-2005-1280date:2018-10-19T15:31:46.737

SOURCES RELEASE DATE

db:CERT/CCid:VU#386964date:2006-09-28T00:00:00
db:CERT/CCid:VU#773548date:2006-09-19T00:00:00
db:CERT/CCid:VU#845620date:2006-09-11T00:00:00
db:BIDid:13390date:2005-04-26T00:00:00
db:JVNDBid:JVNDB-2005-000283date:2007-04-01T00:00:00
db:PACKETSTORMid:45250date:2006-04-06T22:26:29
db:PACKETSTORMid:50178date:2006-09-21T23:56:25
db:PACKETSTORMid:52708date:2006-12-06T02:47:36
db:PACKETSTORMid:38413date:2005-07-02T00:59:37
db:CNNVDid:CNNVD-200505-090date:2005-04-27T00:00:00
db:NVDid:CVE-2005-1280date:2005-05-02T04:00:00