ID

VAR-200609-1252


CVE

CVE-2006-4339


TITLE

OpenSSL SSLv2 client code fails to properly check for NULL

Trust: 0.8

sources: CERT/CC: VU#386964

DESCRIPTION

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. Hitachi Web Server accepts an SSL certificate sent by a clinet trying to connect to the Server even if the certificate is fraudulent. The vulnerability does not affect the product if the SSL authenticaton client feature is disabled.An attacker could gain access with a fraudulent certificate. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. The NSS libraries used in the Sun One Application Server and the Sun Java System web server contain an unspecified vulnerability that may allow an attacker to create a denial-of-service condition. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. BIND uses RSA cryptography as part of its DNSSEC implementation. As a result, to resolve the security issue, these packages need to be upgraded and for both KEY and DNSKEY record types, new RSASHA1 and RSAMD5 keys need to be generated using the "-e" option of dnssec-keygen, if the current keys were generated using the default exponent of 3. You are able to determine if your keys are vulnerable by looking at the algorithm (1 or 5) and the first three characters of the Base64 encoded RSA key. RSAMD5 (1) and RSASHA1 (5) keys that start with "AQM", "AQN", "AQO", or "AQP" are vulnerable. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445 _______________________________________________________________________ Updated Packages: Mandriva Linux 2006.0: 1035f92172986ed63ca035de0603a0fd 2006.0/i586/bind-9.3.1-4.2.20060mdk.i586.rpm 4f5949d85f13c68220f4f5f030f63849 2006.0/i586/bind-devel-9.3.1-4.2.20060mdk.i586.rpm f201e05548b673268038e95225451085 2006.0/i586/bind-utils-9.3.1-4.2.20060mdk.i586.rpm 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm Mandriva Linux 2006.0/X86_64: 83b6c31bef9e4df229e2fe5cf8c3aa2a 2006.0/x86_64/bind-9.3.1-4.2.20060mdk.x86_64.rpm fb03e9a493645041816c206267a052f4 2006.0/x86_64/bind-devel-9.3.1-4.2.20060mdk.x86_64.rpm f54babadfba3ec593563724208df1eaa 2006.0/x86_64/bind-utils-9.3.1-4.2.20060mdk.x86_64.rpm 4f57cbdc960171c439223f5c20952460 2006.0/SRPMS/bind-9.3.1-4.2.20060mdk.src.rpm Mandriva Linux 2007.0: 6c282a7b5c3cfec534e2557926005bbf 2007.0/i586/bind-9.3.2-8.1mdv2007.0.i586.rpm 03390448f140777d62cdd76e50361526 2007.0/i586/bind-devel-9.3.2-8.1mdv2007.0.i586.rpm 7546dc98ff5e8061636a3a75d6b318fb 2007.0/i586/bind-utils-9.3.2-8.1mdv2007.0.i586.rpm 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: c190d522505a16aa97891f525e0034a4 2007.0/x86_64/bind-9.3.2-8.1mdv2007.0.x86_64.rpm 594cacdac86db81b0c62a7380c6a3a2d 2007.0/x86_64/bind-devel-9.3.2-8.1mdv2007.0.x86_64.rpm e827e65717615868896e43bcb4856f2d 2007.0/x86_64/bind-utils-9.3.2-8.1mdv2007.0.x86_64.rpm 8be8a7d591971e760d1251bd75f97a6c 2007.0/SRPMS/bind-9.3.2-8.1mdv2007.0.src.rpm Corporate 3.0: fa096b2fac1840797e382ba61728d47e corporate/3.0/i586/bind-9.2.3-6.2.C30mdk.i586.rpm 0f1e56f1f3a2689443c04b52d8ce5545 corporate/3.0/i586/bind-devel-9.2.3-6.2.C30mdk.i586.rpm 99bf1f4127e97b8941b597aa5e19aa0a corporate/3.0/i586/bind-utils-9.2.3-6.2.C30mdk.i586.rpm 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm Corporate 3.0/X86_64: e74bea44aee406d11c87227584790c26 corporate/3.0/x86_64/bind-9.2.3-6.2.C30mdk.x86_64.rpm b108edf227b55f3af3ab55b48c23a62a corporate/3.0/x86_64/bind-devel-9.2.3-6.2.C30mdk.x86_64.rpm ba548cbba992f479ad40ecf0808f36cb corporate/3.0/x86_64/bind-utils-9.2.3-6.2.C30mdk.x86_64.rpm 2b49bd9c7edf8bd81b297260b54de32d corporate/3.0/SRPMS/bind-9.2.3-6.2.C30mdk.src.rpm Corporate 4.0: 8bfc97510d4f07568d64c9b9872b4bba corporate/4.0/i586/bind-9.3.2-7.1.20060mlcs4.i586.rpm dda709703f8bf05f1ff59ae6132a81a7 corporate/4.0/i586/bind-devel-9.3.2-7.1.20060mlcs4.i586.rpm daf59d23abaaaf62c990d2fa1155688c corporate/4.0/i586/bind-utils-9.3.2-7.1.20060mlcs4.i586.rpm ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm Corporate 4.0/X86_64: 3d1bbe1e7d4f2de6e546996e181a16b0 corporate/4.0/x86_64/bind-9.3.2-7.1.20060mlcs4.x86_64.rpm c1b8467d62623ef5daf35a696ab2389e corporate/4.0/x86_64/bind-devel-9.3.2-7.1.20060mlcs4.x86_64.rpm 83cf57110f107c450aaac5931ee52ecb corporate/4.0/x86_64/bind-utils-9.3.2-7.1.20060mlcs4.x86_64.rpm ccfd1d4d79b168ab5f7998e51c305a26 corporate/4.0/SRPMS/bind-9.3.2-7.1.20060mlcs4.src.rpm Multi Network Firewall 2.0: abd228e7f0b762ae8c11c8ecd90200c2 mnf/2.0/i586/bind-9.2.3-6.2.M20mdk.i586.rpm dd7b0785e31880a09d10957695c0552d mnf/2.0/i586/bind-devel-9.2.3-6.2.M20mdk.i586.rpm 0a2052e5f263b8b8d94111a581928c57 mnf/2.0/i586/bind-utils-9.2.3-6.2.M20mdk.i586.rpm eff2c78779b4285783ffea14e6e33c31 mnf/2.0/SRPMS/bind-9.2.3-6.2.M20mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFFWlnDmqjQ0CJFipgRAvl+AKCd5q51CkdHf1UnUJ4imb9Fzl5mZQCfaW5Z 6faoicEmIFqGW4QuEVIhCbU= =bI0u -----END PGP SIGNATURE----- . Any software using OpenSSL to verify X.509 certificates is potentially vulnerable to this issue, as well as any other use of PKCS #1 v1.5, including software uses OpenSSL for SSL or TLS. Updated packages are patched to address this issue. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1174-1 security@debian.org http://www.debian.org/security/ Noah Meyerhans September 11th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : openssl096 Problem-Type : local Vulnerability : cryptographic weakness Debian-specific: no CVE ID : CVE-2006-4339 BugTraq ID : 19849 Debian Bug : 386247 Daniel Bleichenbacher discovered a flaw in OpenSSL cryptographic package that could allow an attacker to generate a forged signature that OpenSSL will accept as valid. For the stable distribution (sarge) this problem has been fixed in version 0.9.6m-1sarge2 This package exists only for compatibility with older software, and is not present in the unstable or testing branches of Debian. We recommend that you upgrade your openssl packages. Note that services linking against the openssl shared libraries will need to be restarted. Common examples of such services include most Mail Transport Agents, SSH servers, and web servers. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m-1sarge2.dsc Size/MD5 checksum: 617 018a88ab90403cb04c62fb3e30b74447 http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m-1sarge2.diff.gz Size/MD5 checksum: 19110 ebf3d65348f1a0e2b09543b02f1752ff http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m.orig.tar.gz Size/MD5 checksum: 2184918 1b63bfdca1c37837dddde9f1623498f9 Alpha architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_alpha.deb Size/MD5 checksum: 1965098 f321c9d2831643d65718730f8ff81f16 AMD64 architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_amd64.deb Size/MD5 checksum: 578014 b47b9fb2acd8c6e22aac6812c7ad4dda ARM architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_arm.deb Size/MD5 checksum: 518746 29a69a8d997445d4ae2a53c337678cc6 HP Precision architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_hppa.deb Size/MD5 checksum: 587368 4291ac3835b28ae9acf555ec90242d26 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_i386.deb Size/MD5 checksum: 1755640 d9fb8d8383c96d0d4ebe4af8cb5e9a3a Intel IA-64 architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_ia64.deb Size/MD5 checksum: 814966 1a366b00181bba9bd04b2312f4ae8f42 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_m68k.deb Size/MD5 checksum: 476722 2002d9eeb9b36d329855042466c9dfc1 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_mips.deb Size/MD5 checksum: 576764 2001e7d3f5d72e0328b8d46f83bb0b4d Little endian MIPS architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_mipsel.deb Size/MD5 checksum: 568756 3b25b7c66ff42626c8f458be9485f9bb PowerPC architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_powerpc.deb Size/MD5 checksum: 582402 e677ab4fd68d34affff58a9c7d2cd823 IBM S/390 architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_s390.deb Size/MD5 checksum: 602334 674b58c6811c7e60ad2bb53ec7c1bcdc Sun Sparc architecture: http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_sparc.deb Size/MD5 checksum: 1458574 d9ab5370d48647780172587e58682297 These files will probably be moved into the stable distribution on its next update. The following supported software versions are affected: HP Tru64 UNIX v 5.1B-4 (SSL and BIND) HP Tru64 UNIX v 5.1B-3 (SSL and BIND) HP Tru64 UNIX v 5.1A PK6 (BIND) HP Tru64 UNIX v 4.0G PK4 (BIND) HP Tru64 UNIX v 4.0F PK8 (BIND) Internet Express (IX) v 6.6 BIND (BIND) HP Insight Management Agents for Tru64 UNIX patch v 3.5.2 and earlier (SSL) BACKGROUND RESOLUTION HP has released the following Early Release Patch kits (ERPs) publicly for use by any customer. The ERP kits use dupatch to install and will not install over any Customer Specific Patches (CSPs) that have file intersections with the ERP. A new patch version for HP Insight Management Agents for Tru64 UNIX is also available that addresses the potential vulnerabilities. The fixes contained in the ERP kits will be available in the following mainstream releases: -Targeted for availability in HP Tru64 UNIX v 5.1B-5 -Internet Express (IX) v 6.7 -HP Insight Management Agents for Tru64 UNIX patch v 3.6.1 (already available) HP Tru64 UNIX Version 5.1B-4 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001167-V51BB27-ES-20070321 Name: T64KIT1001167-V51BB27-ES-20070321 MD5 Checksum: a697a90bd0b1116b6f27d1100bbf81fd HP Tru64 UNIX Version 5.1B-3 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001163-V51BB26-ES-20070315 Name: T64KIT1001163-V51BB26-ES-20070315 MD5 Checksum: d376d403176f0dbe7badd4df4e91c126 HP Tru64 UNIX Version 5.1A PK6 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001160-V51AB24-ES-20070314 Name: T64KIT1001160-V51AB24-ES-20070314 MD5 Checksum: 7bb43ef667993f7c4711b6cf978e0aa7 HP Tru64 UNIX Version 4.0G PK4 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001166-V40GB22-ES-20070316 Name: T64KIT1001166-V40GB22-ES-20070316 MD5 Checksum: a446c39169b769c4a03c654844d5ac45 HP Tru64 UNIX Version 4.0F PK8 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=DUXKIT1001165-V40FB22-ES-20070316 Name: DUXKIT1001165-V40FB22-ES-20070316 MD5 Checksum: 718148c87a913536b32a47af4c36b04e HP Insight Management Agents for Tru64 UNIX patch version 3.6.1 (for kit CPQIIM360) Location: http://h30097.www3.hp.com/cma/patches.html Name: CPQIM360.SSL.01.tar.gz MD5 Checksum: 1001a10ab642461c87540826dfe28652 Internet Express (IX) v 6.6 BIND Note: Customers who use Internet Express (IX) v 6.6 BIND should install the BIND 9.2.8 patch from the ERP kit appropriate for their base operating system version. PRODUCT SPECIFIC INFORMATION The HP Tru64 UNIX v 5.1B-3 and v 5.1B-4 ERP kits distribute two patches: -OpenSSL 0.9.8d -BIND 9.2.8 built with OpenSSL 0.9.8d Note: HP Tru64 UNIX v 5.1A, v 4.0G, and v 4.0F releases did not distribute OpenSSL and so their ERP kits provide only the BIND 9.2.8 patch that has been built with OpenSSL 0.9.8d Customers who have been using OpenSSL on HP Tru64 UNIX v 5.1B-3 and v 5.1B-4 should install the OpenSSL patch from the ERP kit appropriate for their base operating system version. The HP Insight Management Agents for Tru64 UNIX patch contains OpenSSL 0.9.8d and is applicable for HP Tru64 UNIX v 5.1A, v 5.1B-3, and v 5.1B-4. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201408-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenOffice, LibreOffice: Multiple vulnerabilities Date: August 31, 2014 Bugs: #283370, #305195, #320491, #332321, #352864, #386081, #409509, #429482, #514886 ID: 201408-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenOffice and LibreOffice, the worst of which may result in execution of arbitrary code. Background ========== OpenOffice is the open source version of StarOffice, a full office productivity suite. LibreOffice is a fork of OpenOffice. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-office/openoffice-bin < 3.5.5.3 >= 3.5.5.3 2 app-office/openoffice <= 3.5.5.3 Vulnerable! 3 app-office/libreoffice < 4.2.5.2 >= 4.2.5.2 4 app-office/libreoffice-bin < 4.2.5.2 >= 4.2.5.2 ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. ------------------------------------------------------------------- 4 affected packages Description =========== Multiple vulnerabilities have been discovered in OpenOffice and Libreoffice. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenOffice (binary) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=app-office/openoffice-bin-3.5.5.3" All LibreOffice users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-office/libreoffice-4.2.5.2"= All LibreOffice (binary) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=app-office/libreoffice-bin-4.2.5.2" We recommend that users unmerge OpenOffice: # emerge --unmerge "app-office/openoffice" References ========== [ 1 ] CVE-2006-4339 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4339 [ 2 ] CVE-2009-0200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0200 [ 3 ] CVE-2009-0201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0201 [ 4 ] CVE-2009-0217 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217 [ 5 ] CVE-2009-2949 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2949 [ 6 ] CVE-2009-2950 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2950 [ 7 ] CVE-2009-3301 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3301 [ 8 ] CVE-2009-3302 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3302 [ 9 ] CVE-2010-0395 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0395 [ 10 ] CVE-2010-2935 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2935 [ 11 ] CVE-2010-2936 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2936 [ 12 ] CVE-2010-3450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3450 [ 13 ] CVE-2010-3451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3451 [ 14 ] CVE-2010-3452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3452 [ 15 ] CVE-2010-3453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3453 [ 16 ] CVE-2010-3454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3454 [ 17 ] CVE-2010-3689 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3689 [ 18 ] CVE-2010-4253 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4253 [ 19 ] CVE-2010-4643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4643 [ 20 ] CVE-2011-2713 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713 [ 21 ] CVE-2012-0037 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037 [ 22 ] CVE-2012-1149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149 [ 23 ] CVE-2012-2149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2149 [ 24 ] CVE-2012-2334 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2334 [ 25 ] CVE-2012-2665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665 [ 26 ] CVE-2014-0247 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0247 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201408-19.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00849540 Version: 1 HPSBUX02186 SSRT071299 rev.1 - HP-UX running Apache Remote Execution of Arbitrary Code, Denial of Service (DoS), Unauthorized Access NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2007-01-17 Last Updated: 2007-01-23 Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), and unauthorized access. Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with Apache running on HP-UX. These vulnerabilities could be exploited remotely to allow execution of arbitrary code, Denial of Service (DoS), or unauthorized access. SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, and B.11.31 running Apache-based Web Server prior to v.2.0.58.01 BACKGROUND AFFECTED VERSIONS For IPv4: HP-UX B.11.00 HP-UX B.11.11 =========== hpuxwsAPACHE action: install revision A.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE For IPv6: HP-UX B.11.11 =========== hpuxwsAPACHE,revision=B.1.0.00.01 hpuxwsAPACHE,revision=B.1.0.07.01 hpuxwsAPACHE,revision=B.1.0.08.01 hpuxwsAPACHE,revision=B.1.0.09.01 hpuxwsAPACHE,revision=B.1.0.10.01 hpuxwsAPACHE,revision=B.2.0.48.00 hpuxwsAPACHE,revision=B.2.0.49.00 hpuxwsAPACHE,revision=B.2.0.50.00 hpuxwsAPACHE,revision=B.2.0.51.00 hpuxwsAPACHE,revision=B.2.0.52.00 hpuxwsAPACHE,revision=B.2.0.53.00 hpuxwsAPACHE,revision=B.2.0.54.00 hpuxwsAPACHE,revision=B.2.0.55.00 hpuxwsAPACHE,revision=B.2.0.56.00 hpuxwsAPACHE,revision=B.2.0.58.00 action: install revision B.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE HP-UX B.11.23 =========== hpuxwsAPACHE action: install revision B.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE END AFFECTED VERSIONS RESOLUTION HP has made the following software updates available to resolve the issue. Software updates for the Apache-based Web Server are available from: http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE HP-UX B.11.00, B.11.11 and HP-UX B.11.23 require the Apache-based Web Server v.2.0.58.01 or subsequent. Apache Update Procedure Check for Apache Installation ----------------------------- To determine if the Apache web server from HP is installed on your system, use Software Distributor's swlist command. All three revisions of the product may co-exist on a single system. For example, the results of the command swlist -l product | grep -I apache hpuxwsAPACHE B.2.0.55.00 HP-UX Apache-based Web Server Stop Apache ------------- Before updating, make sure the previous Apache binary is stopped. If Apache is not stopped, the installation would be successful but the new version would be prevented from starting until a later time. After determining which Apache is installed, stop Apache with the following commands: for hpuxwsAPACHE: /opt/hpws/apache[32]/bin/apachectl stop Download and Install Apache -------------------------- Download Apache from Software Depot. http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE Verify successful download by comparing the cksum with the value specified on the installation web page. Use SD to swinstall the depot. Installation of this new revision of HP Apache over an existing HP Apache installation is supported, while installation over a non-HP Apache is NOT supported. Removing Apache Installation --------------------------- The potential vulnerability can also be resolved by removing Apache rather than installing a newer revision. To remove Apache use both Software Distributor's "swremove" command and also "rm -rf" the home location as specified in the rc.config.d file "HOME" variables. %ls /etc/rc.config.d | \ grep apache hpapache2conf hpws_apache[32]conf MANUAL ACTIONS: Yes - Update plus other actions Install the revision of the product. PRODUCT SPECIFIC INFORMATION HP-UX Security Patch Check: Security Patch Check revision B.02.00 analyzes all HP-issued Security Bulletins to provide a subset of recommended actions that potentially affect a specific HP-UX system. For more information: http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA HISTORY: rev.1 - 23 January 2007 Initial Release Third Party Security Patches: Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." \xa9Copyright 2007 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Background ========== OpenSSL is a toolkit implementing the Secure Sockets Layer, Transport Layer Security protocols and a general-purpose cryptography library. The x86 emulation base libraries for AMD64 contain a vulnerable version of OpenSSL. NOTE: Any packages listed without architecture tags apply to all architectures... HP Secure Web Server (SWS) for OpenVMS (based on Apache) V2.1-1 and earlier. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2002-0839 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 CVE-2002-0840 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2003-0542 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 CVE-2004-0492 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2005-2491 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2005-3352 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2005-3357 (AV:N/AC:H/Au:N/C:N/I:N/A:C) 5.4 CVE-2006-2937 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2006-2940 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2006-3738 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2006-3747 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2006-3918 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2006-4339 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2006-4343 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2007-5000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2007-6388 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2008-0005 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2009-1891 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2009-3095 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2009-3291 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2009-3292 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2009-3293 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2009-3555 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8 CVE-2010-0010 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following software updates available to resolve these vulnerabilities. Kit Name Location HP SWS V2.2 for OpenVMS Alpha and OpenVMS Integrity servers. Background ========== The Mozilla Network Security Service is a library implementing security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. This impacts any software using the NSS library, like the Mozilla products Firefox, Thunderbird and Seamonkey. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------- ~ VMware Security Advisory Advisory ID: VMSA-2008-0005 Synopsis: Updated VMware Workstation, VMware Player, VMware ~ Server, VMware ACE, and VMware Fusion resolve ~ critical security issues Issue date: 2008-03-17 Updated on: 2008-03-17 (initial release of advisory) CVE numbers: CVE-2008-0923 CVE-2008-0923 CVE-2008-1361 ~ CVE-2008-1362 CVE-2007-5269 CVE-2006-2940 ~ CVE-2006-2937 CVE-2006-4343 CVE-2006-4339 ~ CVE-2007-5618 CVE-2008-1364 CVE-2008-1363 ~ CVE-2008-1340 - ------------------------------------------------------------------- 1. Summary: ~ Several critical security vulnerabilities have been addressed ~ in the newest releases of VMware's hosted product line. 2. Relevant releases: ~ VMware Workstation 6.0.2 and earlier ~ VMware Workstation 5.5.4 and earlier ~ VMware Player 2.0.2 and earlier ~ VMware Player 1.0.4 and earlier ~ VMware ACE 2.0.2 and earlier ~ VMware ACE 1.0.2 and earlier ~ VMware Server 1.0.4 and earlier ~ VMware Fusion 1.1 and earlier 3. Problem description: ~ a. Host to guest shared folder (HGFS) traversal vulnerability ~ On Windows hosts, if you have configured a VMware host to guest ~ shared folder (HGFS), it is possible for a program running in the ~ guest to gain access to the host's file system and create or modify ~ executable files in sensitive locations. NOTE: VMware Server is not affected because it doesn't use host to ~ guest shared folders. Because ~ ESX Server is based on a bare-metal hypervisor architecture ~ and not a hosted architecture, and it doesn't include any ~ shared folder abilities. Fusion and Linux based hosted ~ products are unaffected. ~ VMware would like to thank CORE Security Technologies for ~ working with us on this issue. This addresses advisory ~ CORE-2007-0930. ~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the name CVE-2008-0923 to this issue. ~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ b. Insecure named pipes ~ An internal security audit determined that a malicious Windows ~ user could attain and exploit LocalSystem privileges by causing ~ the authd process to connect to a named pipe that is opened and ~ controlled by the malicious user. ~ The same internal security audit determined that a malicious ~ Windows user could exploit an insecurely created named pipe ~ object to escalate privileges or create a denial of service ~ attack. In this situation, the malicious user could ~ successfully impersonate authd and attain privileges under ~ which Authd is executing. ~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the names CVE-2008-1361, CVE-2008-1362 to these ~ issues. ~ Windows Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ c. Updated libpng library to version 1.2.22 to address various ~ security vulnerabilities ~ Several flaws were discovered in the way libpng handled various PNG ~ image chunks. An attacker could create a carefully crafted PNG ~ image file in such a way that it could cause an application linked ~ with libpng to crash when the file was manipulated. ~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ has assigned the name CVE-2007-5269 to this issue. ~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ NOTE: Fusion is not affected by this issue. ~ d. ~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the following names to these issues: CVE-2006-2940, ~ CVE-2006-2937, CVE-2006-4343, CVE-2006-4339. ~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ NOTE: Fusion is not affected by this issue. ~ e. VIX API default setting changed to a more secure default value ~ Workstation 6.0.2 allowed anonymous console access to the guest by ~ means of the VIX API. This release, Workstation 6.0.3, disables ~ this feature. This means that the Eclipse Integrated Virtual ~ Debugger and the Visual Studio Integrated Virtual Debugger will now ~ prompt for user account credentials to access a guest. ~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ f. Windows 2000 based hosted products privilege escalation ~ vulnerability ~ This release addresses a potential privilege escalation on ~ Windows 2000 hosted products. Certain services may be improperly ~ registered and present a security vulnerability to Windows 2000 ~ machines. ~ VMware would like to thank Ray Hicken for reporting this issue and ~ David Maciejak for originally pointing out these types of ~ vulnerabilities. ~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2007-5618 to this issue. ~ Windows versions of Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ NOTE: Fusion and Linux based products are not affected by this ~ issue. ~ g. DHCP denial of service vulnerability ~ A potential denial of service issue affects DHCP service running ~ on the host. ~ VMware would like to thank Martin O'Neal for reporting this issue. ~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1364 to this issue. ~ Hosted products ~ --------------- ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ VMware Fusion 1.1 upgrade to version 1.1.1 (Build# 72241) ~ NOTE: This issue doesn't affect the latest versions of VMware ~ Workstation 6, VMware Player 2, and ACE 2 products. ~ h. Local Privilege Escalation on Windows based platforms by ~ Hijacking VMware VMX configuration file ~ VMware uses a configuration file named "config.ini" which ~ is located in the application data directory of all users. ~ By manipulating this file, a user could gain elevated ~ privileges by hijacking the VMware VMX process. ~ VMware would like to thank Sun Bing for reporting the issue. ~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1363 to this issue. ~ Windows based Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Workstation 5.5 upgrade to version 5.5.6 (Build# 80404) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware Player 1.0 upgrade to version 1.0.6 (Build# 80404) ~ VMware Server 1.0 upgrade to version 1.0.5 (Build# 80187) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) ~ VMware ACE 1.0 upgrade to version 1.0.5 (Build# 79846) ~ i. Virtual Machine Communication Interface (VMCI) memory corruption ~ resulting in denial of service ~ VMCI was introduced in VMware Workstation 6.0, VMware Player 2.0, ~ and VMware ACE 2.0. It is an experimental, optional feature and ~ it may be possible to crash the host system by making specially ~ crafted calls to the VMCI interface. This may result in denial ~ of service via memory exhaustion and memory corruption. ~ VMware would like to thank Andrew Honig of the Department of ~ Defense for reporting this issue. ~ The Common Vulnerabilities and Exposures project (cve.mitre.org) ~ assigned the name CVE-2008-1340 to this issue. ~ Hosted products ~ --------------- ~ VMware Workstation 6.0 upgrade to version 6.0.3 (Build# 80004) ~ VMware Player 2.0 upgrade to version 2.0.3 (Build# 80004) ~ VMware ACE 2.0 upgrade to version 2.0.1 (Build# 80004) 4. Solution: Please review the Patch notes for your product and version and verify the md5sum of your downloaded file. ~ VMware Workstation 6.0.3 ~ ------------------------ ~ http://www.vmware.com/download/ws/ ~ Release notes: ~ http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html ~ Windows binary ~ md5sum: 323f054957066fae07735160b73b91e5 ~ RPM Installation file for 32-bit Linux ~ md5sum: c44183ad11082f05593359efd220944e ~ tar Installation file for 32-bit Linux ~ md5sum: 57601f238106cb12c1dea303ad1b4820 ~ RPM Installation file for 64-bit Linux ~ md5sum: e9ba644be4e39556724fa2901c5e94e9 ~ tar Installation file for 64-bit Linux ~ md5sum: d8d423a76f99a94f598077d41685e9a9 ~ VMware Workstation 5.5.5 ~ ------------------------ ~ http://www.vmware.com/download/ws/ws5.html ~ Release notes: ~ http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html ~ Windows binary ~ md5sum: 9c2dd94db5eed93d7f64e8d6ba8d8bd3 ~ Compressed Tar archive for 32-bit Linux ~ md5sum: 77401c0842a151f0b2db0b4fcb0d16eb ~ Linux RPM version for 32-bit Linux ~ md5sum: c222b6db934deb9c1bb79b16b25a3202 ~ VMware Server 1.0.5 ~ ------------------- ~ http://www.vmware.com/download/server/ ~ Release notes: ~ http://www.vmware.com/support/server/doc/releasenotes_server.html ~ VMware Server for Windows 32-bit and 64-bit ~ md5sum: 3c4a57310c55e17bf8e4a1059d5b36cc ~ VMware Server Windows client package ~ md5sum: cb3dd2439203dc510f4d95f06ba59d21 ~ VMware Server for Linux ~ md5sum: 161dcbe5af9bbd9834a86bf7c599903e ~ VMware Server for Linux rpm ~ md5sum: fc3b81ed18b53eda943a992971e9f84a ~ Management Interface ~ md5sum: dd10d25895d9994bd27ca896152f48ef ~ VMware Server Linux client package ~ md5sum: aae18f1f7b8811b5499e3a358754d4f8 ~ VMware ACE 2.0.3 and 1.0.5 ~ -------------------------- ~ http://www.vmware.com/download/ace/ ~ Windows Release notes: ~ http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html ~ VMware Fusion 1.1.1 ~ ------------------- ~ http://www.vmware.com/download/fusion/ ~ Release notes: ~ http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html ~ md5sum: 38e116ec26b30e7a6ac47c249ef650d0 ~ VMware Player 2.0.3 and 1.0.6 ~ ---------------------- ~ http://www.vmware.com/download/player/ ~ Release notes Player 1.x: ~ http://www.vmware.com/support/player/doc/releasenotes_player.html ~ Release notes Player 2.0 ~ http://www.vmware.com/support/player2/doc/releasenotes_player2.html ~ 2.0.3 Windows binary ~ md5sum: 0c5009d3b569687ae139e13d24c868d3 ~ VMware Player 2.0.3 for Linux (.rpm) ~ md5sum: 53502b2112a863356dcd13dd0d8dd8f2 ~ VMware Player 2.0.3 for Linux (.tar) ~ md5sum: 2305fcff49bef6e4ad83742412eac978 ~ VMware Player 2.0.3 - 64-bit (.rpm) ~ md5sum: cf945b571c4d96146ede010286fdfca5 ~ VMware Player 2.0.3 - 64-bit (.tar) ~ md5sum: f99c5b293eb87c5f918ad24111565b9f ~ 1.0.6 Windows binary ~ md5sum: 895081406c4de5361a1700ec0473e49c ~ Player 1.0.6 for Linux (.rpm) ~ md5sum: 8adb23799dd2014be0b6d77243c76942 ~ Player 1.0.6 for Linux (.tar) ~ md5sum: c358f8e1387fb60863077d6f8a9f7b3f 5. References: ~ CVE numbers ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0923 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1361 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1362 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5618 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1364 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1363 ~ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1340 - ------------------------------------------------------------------- 6. Contact: E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: ~ * security-announce@lists.vmware.com ~ * bugtraq@securityfocus.com ~ * full-disclosure@lists.grok.org.uk E-mail: security@vmware.com Security web site http://www.vmware.com/security VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2008 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFH3yTxS2KysvBH1xkRCHq8AJ0QOMocv/gSz/hgdojA39PGVO6pUACePCRv Cv8MnL2bYPyDfYQ3f4IUL+w= =tFXS -----END PGP SIGNATURE-----

Trust: 5.67

sources: NVD: CVE-2006-4339 // CERT/CC: VU#845620 // JVNDB: JVNDB-2007-000772 // CERT/CC: VU#386964 // CERT/CC: VU#547300 // CERT/CC: VU#594904 // BID: 19849 // PACKETSTORM: 52186 // PACKETSTORM: 49782 // PACKETSTORM: 49955 // PACKETSTORM: 56053 // PACKETSTORM: 128056 // PACKETSTORM: 53990 // PACKETSTORM: 49826 // PACKETSTORM: 101257 // PACKETSTORM: 51167 // PACKETSTORM: 64684

AFFECTED PRODUCTS

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 2.4

vendor:f5model: - scope: - version: -

Trust: 2.4

vendor:freebsdmodel: - scope: - version: -

Trust: 2.4

vendor:openpkgmodel: - scope: - version: -

Trust: 2.4

vendor:opensslmodel: - scope: - version: -

Trust: 2.4

vendor:oraclemodel: - scope: - version: -

Trust: 2.4

vendor:red hatmodel: - scope: - version: -

Trust: 2.4

vendor:suse linuxmodel: - scope: - version: -

Trust: 2.4

vendor:slackware linuxmodel: - scope: - version: -

Trust: 2.4

vendor:ubuntumodel: - scope: - version: -

Trust: 2.4

vendor:rpathmodel: - scope: - version: -

Trust: 2.4

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 1.6

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 1.6

vendor:sunmodel:jre 011scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:sdk 011scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:jre 010scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:sdk 010scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jre 013scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jre 014scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jrescope:eqversion:1.2.2

Trust: 1.2

vendor:opensslmodel:opensslscope:eqversion:0.9.8b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.2b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6m

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.5

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:0.9.7

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.3

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.1c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.5a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.3a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.4

Trust: 1.0

vendor:sunmodel:sdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 15scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jdk 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 007scope:eqversion:1.1.6

Trust: 0.9

vendor:sunmodel:jre 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 06scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre .0 04scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:sdk 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk b 005scope:eqversion:1.1.7

Trust: 0.9

vendor:sunmodel:sdk 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 09scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk .0 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk .0 4scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk 008scope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:sdk 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre .0 05scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:sdk 012scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 014scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jdk 009scope:eqversion:1.1.8

Trust: 0.9

vendor:appgate network securitymodel: - scope: - version: -

Trust: 0.8

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:attachmatewrqmodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:gnutlsmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:iaik java groupmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:internet consortiummodel: - scope: - version: -

Trust: 0.8

vendor:intotomodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:operamodel: - scope: - version: -

Trust: 0.8

vendor:rsa securitymodel: - scope: - version: -

Trust: 0.8

vendor:ssh security corpmodel: - scope: - version: -

Trust: 0.8

vendor:sybasemodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:vandykemodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application server standardscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application server version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer light version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer professional version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer standard version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus server - enterprise editionscope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus server - standard editionscope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus server - standard edition version 4scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus server - web editionscope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus server - web edition version 4scope: - version: -

Trust: 0.8

vendor:hitachimodel:web serverscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application server enterprisescope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application server standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 0.8

vendor:hitachimodel:ucosminexus developer lightscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developer standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope: - version: -

Trust: 0.8

vendor:sunmodel:jre 005scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 04scope:eqversion:1.3.1

Trust: 0.6

vendor:sunmodel:jre .0 01scope:eqversion:1.4

Trust: 0.6

vendor:sunmodel:jdk 003scope:eqversion:1.2.1

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.4.2

Trust: 0.6

vendor:sunmodel:jdkscope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk .0 04scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 005scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jrescope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:sdk 13scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 005scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre .0 04scope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:jdk 006scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 01scope:eqversion:1.3.1

Trust: 0.6

vendor:sunmodel:jdk 05scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk .0 03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.2.2

Trust: 0.6

vendor:sybasemodel:appeonscope:eqversion:3.1

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:sdk 05scope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:jdk 002scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 008scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 12scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk 009scope:eqversion:1.1.6

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.1

Trust: 0.6

vendor:sunmodel:sdk 013scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:jre 012scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 005scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 009scope:eqversion:1.1.8

Trust: 0.6

vendor:beamodel:systems weblogic expressscope:eqversion:7.0.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:5.1.79

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.7

Trust: 0.3

vendor:securemodel:computing snapgear sg565scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.5

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(1)

Trust: 0.3

vendor:attachmatemodel:reflection for secure itscope:eqversion:6.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server hosting editionscope:eqversion:1.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.1.0

Trust: 0.3

vendor:opensslmodel:project openssl b-36.8scope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:2.9

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.03

Trust: 0.3

vendor:avayamodel:s8300 cmscope:eqversion:3.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.2

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:neversion:4.3.10

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.1

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 0.3

vendor:ciscomodel:onsscope:neversion:154548.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.11

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:neversion:6.0.380004

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.5

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:5.2.2

Trust: 0.3

vendor:ibmmodel:hardware management console for iseriesscope:eqversion:3.3.7

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.334685

Trust: 0.3

vendor:sybasemodel:ffi global fix litescope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.2.7

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(0)

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.6

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(1)

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.7

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.2

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:java web proxy server sp8scope:eqversion:3.6

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.6

Trust: 0.3

vendor:openpkgmodel:2-stable-20061018scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.3

vendor:sunmodel:jre bscope:eqversion:1.1.7

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.3

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.12

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.04

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-release-p3scope:eqversion:4.11

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.12

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.1

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:netbsdmodel:4,0 betascope: - version: -

Trust: 0.3

vendor:sunmodel:jre .0 01scope:eqversion:1.3

Trust: 0.3

vendor:freebsdmodel:-stablepre122300scope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind a1scope:eqversion:9.4

Trust: 0.3

vendor:operamodel:software opera web browser 1win32scope:eqversion:7.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2006.0

Trust: 0.3

vendor:sunmodel:jdk 09scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:95000

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.2.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.51

Trust: 0.3

vendor:sunmodel:jre 12scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.13

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:sunmodel:sdk 10scope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(0)

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java web proxy serverscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.5

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 06scope: - version: -

Trust: 0.3

vendor:sunmodel:one application server standard editionscope:eqversion:7.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.5.1

Trust: 0.3

vendor:sunmodel:java system web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personal ossscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:sdk 04scope:eqversion:1.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0.1

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.1.3

Trust: 0.3

vendor:ciscomodel:access registrarscope: - version: -

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.1

Trust: 0.3

vendor:sybasemodel:solonde etlscope:eqversion:3.6

Trust: 0.3

vendor:s u s emodel:linux openexchange serverscope: - version: -

Trust: 0.3

vendor:sunmodel:jssescope:eqversion:1.0.2

Trust: 0.3

vendor:sunmodel:one web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.05

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.54

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:7.0.0.1

Trust: 0.3

vendor:sunmodel:one web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.51

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.03

Trust: 0.3

vendor:sunmodel:one web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.05

Trust: 0.3

vendor:iscmodel:bind -p2scope:neversion:9.2.6

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.04

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:5.5.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.1

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:5.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:4.0

Trust: 0.3

vendor:gentoomodel:www-client/operascope:eqversion:9.0.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:2.3(5)

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.10

Trust: 0.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.12

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.2

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.01

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:2.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44900

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.4

Trust: 0.3

vendor:opensslmodel:project openssl beta2scope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:call manager es56scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:sdk 07scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.10

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.01

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.02

Trust: 0.3

vendor:turbolinuxmodel:personalscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.02

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.04

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-release-p32scope:eqversion:4.5

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1.1

Trust: 0.3

vendor:sunmodel:jre 007scope:eqversion:1.1.6

Trust: 0.3

vendor:sybasemodel:sdkscope:eqversion:12.5.1

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:jre 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:2.2

Trust: 0.3

vendor:attachmatemodel:reflection ftp clientscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.1

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.3

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0

Trust: 0.3

vendor:sybasemodel:ffi global fixscope:eqversion:0

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:neversion:5.1.1

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ciscomodel:call manager es33scope:eqversion:4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.1

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:5.5.5

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.0

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:5.4

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.4.1

Trust: 0.3

vendor:openvpnmodel:beta11scope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:jsse 01scope:eqversion:1.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.1

Trust: 0.3

vendor:sunmodel:java system web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:java system application server 2004q2scope:eqversion:7.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.2

Trust: 0.3

vendor:iscmodel:bind bscope:eqversion:9.3.3

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:6.0.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.3

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.444386

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3.132

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp3scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:jre 009scope:eqversion:1.1.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.1.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.5

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.52

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.2

Trust: 0.3

vendor:sunmodel:jre b 005scope:eqversion:1.1.7

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.639

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.5

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:3.1

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.342958

Trust: 0.3

vendor:sunmodel:jsse 02scope:eqversion:1.0.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope: - version: -

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:sunmodel:jre 11scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.8

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3.728

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.3(1)

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:neversion:2.0.8

Trust: 0.3

vendor:novellmodel:international cryptographic infrastructurescope:neversion:2.7.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.7

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.54

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:83

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.3.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.1

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:7.0.0.1

Trust: 0.3

vendor:securemodel:computing snapgear u2scope:neversion:3.1.4

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.07

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.53

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.1.1

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.21

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:securemodel:computing snapgear sg580scope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.4

Trust: 0.3

vendor:ciscomodel:ons 15454e optical transport platformscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.1

Trust: 0.3

vendor:sybasemodel:data auditingscope:eqversion:4.5.3

Trust: 0.3

vendor:openofficemodel:openofficescope:neversion:3.2

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.5

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.11

Trust: 0.3

vendor:freebsdmodel:-release-p42scope:eqversion:4.4

Trust: 0.3

vendor:ciscomodel:ons mstpscope:eqversion:154540

Trust: 0.3

vendor:arkoonmodel:ssl360scope:neversion:2.0/3

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r1standardscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.5

Trust: 0.3

vendor:ibmmodel:hardware management console for pseriesscope:eqversion:3.3.7

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.11

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.2

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.5

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.6(0)

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.2

Trust: 0.3

vendor:sybasemodel:data direct odbc/ole-db drivers for asescope:eqversion:0

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r1.0scope:eqversion:5.0

Trust: 0.3

vendor:sshmodel:communications security tectiascope:eqversion:2.0

Trust: 0.3

vendor:iscmodel:bind a5scope:eqversion:9.4

Trust: 0.3

vendor:sybasemodel:global fix litescope:eqversion:0

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.3

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.01

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.1.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(1)

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.6(1)

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.8

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.1

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.2.6

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:neversion:4.4.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.22

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r5.0scope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.4

Trust: 0.3

vendor:hpmodel:virtualvault a.04.50scope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 14scope:eqversion:1.1.8

Trust: 0.3

vendor:avayamodel:integrated managementscope: - version: -

Trust: 0.3

vendor:sunmodel:secure global desktopscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.14

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:iscmodel:bind a4scope:eqversion:9.4

Trust: 0.3

vendor:securemodel:computing snapgear sg560scope:eqversion:0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.5

Trust: 0.3

vendor:openpkgmodel:currentscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.2

Trust: 0.3

vendor:sunmodel:jre 10scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:2.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:one web serverscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.2.7

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:neversion:2.2.1

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.3

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.07

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.11

Trust: 0.3

vendor:ciscomodel:call manager es07scope:eqversion:4.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.04

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 04scope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.1

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.5

Trust: 0.3

vendor:s u s emodel:tomboyscope:eqversion:9.3

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r1.0scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:one application server platform editionscope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:x0

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.5

Trust: 0.3

vendor:sybasemodel:ecdascope:eqversion:12.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.2

Trust: 0.3

vendor:operamodel:software opera web browser jscope:eqversion:7.11

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.5

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.3.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.4

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.4

Trust: 0.3

vendor:sybasemodel:appeonscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.1

Trust: 0.3

vendor:sunmodel:one web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:neversion:5.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.7

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.4

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.42

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.1

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:call manager es50scope:eqversion:4.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:8.1.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.50

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.1

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.04

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.06

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0.1

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.4

Trust: 0.3

vendor:sybasemodel:ecdascope:eqversion:12.5

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.2.2

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.1

Trust: 0.3

vendor:sunmodel:sdk 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:9.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp4scope:eqversion:3.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.3

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.8

Trust: 0.3

vendor:redmodel:hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.3

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(2)

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.2

Trust: 0.3

vendor:operamodel:software opera web browser beta buildscope:eqversion:7.2012981

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.11

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.8

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.3.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:security marsscope:eqversion:4.2.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:6.2

Trust: 0.3

vendor:opensslmodel:project openssl lscope:eqversion:0.9.6

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.6

Trust: 0.3

vendor:sunmodel:sdk 003scope:eqversion:1.2.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.53

Trust: 0.3

vendor:attachmatemodel:reflection sp1scope:neversion:14.0

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.2.3

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.2.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.1

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.0

Trust: 0.3

vendor:netbsdmodel:current pre20010701scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.15

Trust: 0.3

vendor:turbolinuxmodel:f...scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.0

Trust: 0.3

vendor:sunmodel:jdk bscope:eqversion:1.1.7

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.6

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.15

Trust: 0.3

vendor:freebsdmodel:-release-p38scope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.00scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.14

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:corp bankingscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.4

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.14

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:java system application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.4

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:tomboyscope:eqversion:10.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.0

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.5.1

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.1.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:neversion:5.1.1

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:opensslmodel:project openssl beta3scope:eqversion:0.9.7

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.0.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:eqversion:4.3.9

Trust: 0.3

vendor:sunmodel:one web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:3.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.12

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.10

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.4

Trust: 0.3

vendor:redmodel:hat red hat network satellite serverscope:eqversion:4.2

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.5

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r1enterprisescope:eqversion:7.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:freebsdmodel:5.4-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bind a6scope:eqversion:9.4

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.3

Trust: 0.3

vendor:sunmodel:jdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.9

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(0)

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:8.0

Trust: 0.3

vendor:freebsdmodel:-release-p8scope:eqversion:4.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.3

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.3.1

Trust: 0.3

vendor:freebsdmodel:-release-p17scope:eqversion:4.7

Trust: 0.3

vendor:trustixmodel:secure enterprise linuxscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:call manager es24scope:eqversion:4.1

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:9.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.2

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:14.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:13.0.4

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44910

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser .6win32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:sunmodel:sdk 11scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.8

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.11

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.1-1

Trust: 0.3

vendor:sybasemodel:data integration suite discope:eqversion:1.0

Trust: 0.3

vendor:susemodel:linux enterprise sdkscope:eqversion:10

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2.1

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:13.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:sunmodel:java web proxy server sp7scope:eqversion:3.6

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:java system application server platform edition q1 ur1scope:eqversion:8.12005

Trust: 0.3

vendor:sybasemodel:data auditingscope:eqversion:4.5.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:neversion:4.3.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.05

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.9

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.3

Trust: 0.3

vendor:attachmatemodel:reflection for secure it sp1scope:neversion:6.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:1.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0.2

Trust: 0.3

vendor:openpkgmodel:stablescope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:sdk 14scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:4.10-prereleasescope: - version: -

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q1scope: - version: -

Trust: 0.3

vendor:sunmodel:sdk 01scope:eqversion:1.4.2

Trust: 0.3

vendor:attachmatemodel:reflection sftp clientscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.0

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:redmodel:hat red hat network satellite serverscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:s8700 cmscope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:linux professional ossscope:eqversion:10.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.9

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.3

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:3.0

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.02

Trust: 0.3

vendor:turbolinuxmodel:appliance server workgroup editionscope:eqversion:1.0

Trust: 0.3

vendor:sunmodel:java system application server platform edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:vmwaremodel:player buildscope:neversion:1.0.680404

Trust: 0.3

vendor:avayamodel:s8710 cmscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.9

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.7

Trust: 0.3

vendor:sybasemodel:iq extended enterpirse editionscope:eqversion:12.7

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jdk 13scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.12

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:sunmodel:java system application server standard 2004q2 r5scope:eqversion:7.0.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.2.0

Trust: 0.3

vendor:iscmodel:bind rc3scope:neversion:9.2.7

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:sdk 07ascope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:call manager es32scope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:interactive responsescope: - version: -

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:3.3

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.6

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.1

Trust: 0.3

vendor:operamodel:software opera web browser macscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition 2005q1rhel2.1/rhel3scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.3

Trust: 0.3

vendor:novellmodel:international cryptographic infostructurescope:eqversion:2.6.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:eqversion:4.3.8

Trust: 0.3

vendor:debianmodel:linux ppcscope:eqversion:3.1

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(3)

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browser bscope:eqversion:7.11

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:neversion:5.5.680404

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.3

Trust: 0.3

vendor:opensslmodel:project openssl kscope:neversion:0.9.7

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.2.7

Trust: 0.3

vendor:sunmodel:java system application server standard 2004q2 r4scope:eqversion:7.0.0

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:iscmodel:bind rc3scope:neversion:9.3.3

Trust: 0.3

vendor:ciscomodel:call manager sr2scope:eqversion:4.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:ciscomodel:call manager sr2bscope:eqversion:4.0

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r2 enterprisescope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java system web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:netbsdmodel:current augustscope:eqversion:232006

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.6(0)

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.2

Trust: 0.3

vendor:sunmodel:sdk 007scope:eqversion:1.1.8

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:7.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.05

Trust: 0.3

vendor:sunmodel:one web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.13

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:3.x

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(1)

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure itscope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.2

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.3

Trust: 0.3

vendor:sunmodel:jdk 15scope:eqversion:1.1.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.11

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.13

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:cvlanscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r3 enterprisescope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java enterprise system 2003q4scope: - version: -

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.4

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r3 standardscope:eqversion:7.0

Trust: 0.3

vendor:iscmodel:bind a2scope:eqversion:9.4

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.10

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.01

Trust: 0.3

vendor:sunmodel:java system application server 2004q2scope:eqversion:7

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.02

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.6

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:3.1

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind a3scope:eqversion:9.4

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.03

Trust: 0.3

vendor:vmwaremodel:acescope:eqversion:2.0

Trust: 0.3

vendor:netbsdmodel:3.1 rc3scope: - version: -

Trust: 0.3

vendor:sybasemodel:e-biz impactscope:eqversion:5.5

Trust: 0.3

vendor:sybasemodel:asescope:eqversion:11.5

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.03

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:5.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.02

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.12

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.1.6

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java system application server enterprise 2004q2 r5scope:eqversion:7.0.0

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.8

Trust: 0.3

vendor:freebsdmodel:-release-p7scope:eqversion:4.8

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:one web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 14scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jre 13scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:10.5

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.2

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:sunmodel:jdk 12scope:eqversion:1.1.8

Trust: 0.3

vendor:iscmodel:bind b3scope:neversion:9.4

Trust: 0.3

vendor:sybasemodel:mach desktopscope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.6(1)

Trust: 0.3

vendor:sunmodel:jdk 11scope:eqversion:1.1.8

Trust: 0.3

vendor:sgimodel:advanced linux environmentscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:secure global desktopscope:neversion:4.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:neversion:2.1.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:neversion:1.4.13

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.04

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.1

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0.1

Trust: 0.3

vendor:sunmodel:one web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:java system application server standard platform q1scope:eqversion:8.12005

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.52

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.10

Trust: 0.3

vendor:redhatmodel:red hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6

Trust: 0.3

vendor:arkoonmodel:ssl360scope:eqversion:2.0/2

Trust: 0.3

vendor:hpmodel:webproxy a.02.10scope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.2

Trust: 0.3

vendor:sunmodel:java system application server enterprise 2004q2 r4scope:eqversion:7.0.0

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.1

Trust: 0.3

vendor:securemodel:computing snapgear sg710scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:call manager es62scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:secure acs buildscope:neversion:4.1(1)23

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:sunmodel:one web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:8.2

Trust: 0.3

vendor:opensslmodel:project openssl cscope:neversion:0.9.8

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:neversion:2.2

Trust: 0.3

vendor:vmwaremodel:acescope:neversion:2.0.3

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.10

Trust: 0.3

vendor:sybasemodel:bpi for healthcarescope:eqversion:2.2

Trust: 0.3

vendor:sunmodel:jdk 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:jre 006scope:eqversion:1.2.2

Trust: 0.3

vendor:avayamodel:s8500scope:eqversion:0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.3

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:10.2.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:hpmodel:webproxy a.02.00scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0.0.1

Trust: 0.3

vendor:hpmodel:virtualvault a.04.70scope: - version: -

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)5.1

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.1.6

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.3

Trust: 0.3

vendor:avayamodel:s8710 r2.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r1.0scope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:sybasemodel:e-biz impactscope:eqversion:5.4.5

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.7

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:iscmodel:bind -p2scope:neversion:9.3.2

Trust: 0.3

vendor:turbolinuxmodel:homescope: - version: -

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.4

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.3

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.5

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 03scope: - version: -

Trust: 0.3

vendor:turbolinuxmodel:desktopscope:eqversion:10.0

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154542.3(5)

Trust: 0.3

vendor:arkoonmodel:ssl360scope:eqversion:1.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3-1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1

Trust: 0.3

vendor:sunmodel:jdk 10scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sybasemodel:ffi uofxscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44920

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)4.2

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.50

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.9

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:multimediascope: - version: -

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(2)

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.1.1

Trust: 0.3

vendor:ciscomodel:wide area file servicesscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:linux desktopscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:call manager sr2cscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java web proxy server sp2scope:eqversion:3.6

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:5.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:neversion:13.0.5

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:8.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.11

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.5

Trust: 0.3

vendor:turbolinuxmodel:fujiscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.7

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.11

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:1.0.6

Trust: 0.3

vendor:sybasemodel:asescope:eqversion:12.5.2

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:5.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:7.0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.4

Trust: 0.3

vendor:sunmodel:jsse 03scope:eqversion:1.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:sunmodel:one web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:openpkgmodel:e1.0-solidscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.1

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.2

Trust: 0.3

vendor:vmwaremodel:serverscope:neversion:1.0.5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.5.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(2)

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:8.1

Trust: 0.3

vendor:s u s emodel:suse linux standard serverscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r5.0scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.2

Trust: 0.3

vendor:freebsdmodel:-release/alphascope:eqversion:5.1

Trust: 0.3

vendor:sybasemodel:ffi bptwscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(3)

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:2.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:sunmodel:java web proxy server sp6scope:eqversion:3.6

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.0

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.4

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r2 standardscope:eqversion:7.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.3.2

Trust: 0.3

vendor:ciscomodel:call manager 4.1 sr4scope: - version: -

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.1-1

Trust: 0.3

vendor:hpmodel:virtualvault a.04.60scope: - version: -

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2.1

Trust: 0.3

vendor:freebsdmodel:-release-p14scope:eqversion:5.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q4scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.0

Trust: 0.3

vendor:redmodel:hat fedora core5scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.02

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.6

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.10

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.3

Trust: 0.3

vendor:ingatemodel:firewalllscope:eqversion:4.4

Trust: 0.3

vendor:sunmodel:one web proxy serverscope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:sdk 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.15

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.7

Trust: 0.3

vendor:openofficemodel:betascope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.04

Trust: 0.3

vendor:sunmodel:solaris 9 x86 updatescope:eqversion:5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0.x

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:1.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.4

Trust: 0.3

vendor:vmwaremodel:acescope:neversion:1.0.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:neversion:3.11.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.14

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.8

Trust: 0.3

vendor:ciscomodel:ons ios-based bladesscope:eqversion:15454

Trust: 0.3

vendor:sunmodel:jre 004scope:eqversion:1.2.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.23

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.07

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.3

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.1

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.11

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.7

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.07

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:navisionmodel:financials serverscope:eqversion:3.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:8.1

Trust: 0.3

vendor:themodel:legion of the bouncy castle java cryptography apiscope:eqversion:1.37

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0.2

Trust: 0.3

vendor:freebsdmodel:-stablepre2002-03-07scope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0(2)

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:eqversion:5.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:1.5.0.8

Trust: 0.3

vendor:sybasemodel:ffi cons bankingscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:4.0

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.2(3)

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:sunmodel:java enterprise system 2004q2scope: - version: -

Trust: 0.3

vendor:van dykemodel:securefxscope:eqversion:4.0.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.1

Trust: 0.3

vendor:sunmodel:java system web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.2

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.01

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.2

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser 3win32scope:eqversion:7.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.4

Trust: 0.3

vendor:sunmodel:java web proxy server sp1scope:eqversion:4.0

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.06

Trust: 0.3

vendor:ciscomodel:call manager es40scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:jre 09scope:eqversion:1.1.6

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.3

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.3

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0

Trust: 0.3

vendor:operamodel:software opera web browser 2win32scope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.01

Trust: 0.3

vendor:ciscomodel:secure acs for windows serverscope:eqversion:3.2

Trust: 0.3

vendor:freebsdmodel:-stablepre050201scope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:idsscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:appeonscope:eqversion:2.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.4

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:3.1

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:6.0.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.4

Trust: 0.3

vendor:sybasemodel:bpi for healthcarescope:eqversion:2.2.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp5scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:sdk .0 05scope:eqversion:1.3

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.1.8

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0x86

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.3.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:40003.1.59.24

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r1.0scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.5

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.20

Trust: 0.3

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:neversion:5.1.1

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:20003.1.59.24

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:10.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:sunmodel:sdk .0 01scope:eqversion:1.4

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:5.12

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0.193

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:ciscomodel:call manager sr1scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:4480

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.15

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.4

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.7

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:8.2

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:vmwaremodel:acescope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.14

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:jre .0 03scope:eqversion:1.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.5

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.3

Trust: 0.3

vendor:sybasemodel:mfolioscope:eqversion:2.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:neversion:5.2.1

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:s8710 r2.0.0scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.11

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.3

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.3.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:jdk 003scope:eqversion:1.1.8

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.3

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:1.3

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.2

Trust: 0.3

vendor:ciscomodel:sip proxy serverscope: - version: -

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.6.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind b2scope:eqversion:9.4

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.02

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3.2

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.1

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.1

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:1.5.8

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(2)

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.7

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:avayamodel:s8500 cmscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11

Trust: 0.3

vendor:redmodel:hat enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.4

Trust: 0.3

vendor:ciscomodel:ons msppscope:eqversion:154540

Trust: 0.3

vendor:sunmodel:jssescope:eqversion:1.0.3

Trust: 0.3

vendor:netbsdmodel:current pre20010805scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.2

Trust: 0.3

vendor:sunmodel:java web proxy serverscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:3.1

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:call manager es55scope:eqversion:4.1

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:5.1

Trust: 0.3

vendor:vmwaremodel:player buildscope:neversion:2.0.380004

Trust: 0.3

vendor:themodel:legion of the bouncy castle java cryptography apiscope:neversion:1.38

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.2

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.657

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.1

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp1scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:solaris updatescope:eqversion:95

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3

Trust: 0.3

vendor:sybasemodel:solonde etlscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.2.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2006.0

Trust: 0.3

vendor:opensslmodel:project openssl beta1scope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.3

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.5

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.2

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:van dykemodel:vshellscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.8

Trust: 0.3

vendor:ciscomodel:application control engine modulescope:eqversion:0

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl mscope:eqversion:0.9.6

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.13

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.3

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.3

Trust: 0.3

sources: CERT/CC: VU#386964 // CERT/CC: VU#845620 // CERT/CC: VU#594904 // CERT/CC: VU#547300 // BID: 19849 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4339
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#386964
value: 0.32

Trust: 0.8

CARNEGIE MELLON: VU#845620
value: 7.56

Trust: 0.8

CARNEGIE MELLON: VU#594904
value: 0.63

Trust: 0.8

CARNEGIE MELLON: VU#547300
value: 2.53

Trust: 0.8

IPA: JVNDB-2007-000772
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2006-4339
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2007-000772
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#386964 // CERT/CC: VU#845620 // CERT/CC: VU#594904 // CERT/CC: VU#547300 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.0

problemtype:CWE-20

Trust: 0.8

sources: JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

THREAT TYPE

network

Trust: 0.3

sources: BID: 19849

TYPE

Design Error

Trust: 0.3

sources: BID: 19849

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000772

PATCH

title:HS07-034url:http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000772

EXTERNAL IDS

db:BIDid:22083

Trust: 3.4

db:NVDid:CVE-2006-4339

Trust: 3.1

db:CERT/CCid:VU#845620

Trust: 2.1

db:SECUNIAid:21709

Trust: 1.8

db:SECUNIAid:22259

Trust: 1.8

db:SECUNIAid:22260

Trust: 1.8

db:SECUNIAid:22284

Trust: 1.8

db:SECUNIAid:23280

Trust: 1.6

db:SECUNIAid:23309

Trust: 1.6

db:BIDid:19849

Trust: 1.3

db:CERT/CCid:VU#594904

Trust: 1.1

db:VUPENid:ADV-2007-0343

Trust: 1.0

db:VUPENid:ADV-2007-2163

Trust: 1.0

db:VUPENid:ADV-2006-4366

Trust: 1.0

db:VUPENid:ADV-2006-4750

Trust: 1.0

db:VUPENid:ADV-2008-0905

Trust: 1.0

db:VUPENid:ADV-2006-4216

Trust: 1.0

db:VUPENid:ADV-2007-4224

Trust: 1.0

db:VUPENid:ADV-2006-3936

Trust: 1.0

db:VUPENid:ADV-2006-4329

Trust: 1.0

db:VUPENid:ADV-2006-4417

Trust: 1.0

db:VUPENid:ADV-2006-4206

Trust: 1.0

db:VUPENid:ADV-2007-2783

Trust: 1.0

db:VUPENid:ADV-2006-3748

Trust: 1.0

db:VUPENid:ADV-2006-5146

Trust: 1.0

db:VUPENid:ADV-2006-3899

Trust: 1.0

db:VUPENid:ADV-2006-4207

Trust: 1.0

db:VUPENid:ADV-2006-3730

Trust: 1.0

db:VUPENid:ADV-2006-4744

Trust: 1.0

db:VUPENid:ADV-2007-1401

Trust: 1.0

db:VUPENid:ADV-2006-3793

Trust: 1.0

db:VUPENid:ADV-2006-3453

Trust: 1.0

db:VUPENid:ADV-2007-1945

Trust: 1.0

db:VUPENid:ADV-2006-4205

Trust: 1.0

db:VUPENid:ADV-2007-2315

Trust: 1.0

db:VUPENid:ADV-2007-1815

Trust: 1.0

db:VUPENid:ADV-2007-0254

Trust: 1.0

db:VUPENid:ADV-2006-3566

Trust: 1.0

db:VUPENid:ADV-2006-4586

Trust: 1.0

db:VUPENid:ADV-2010-0366

Trust: 1.0

db:VUPENid:ADV-2006-4327

Trust: 1.0

db:SECUNIAid:21852

Trust: 1.0

db:SECUNIAid:25284

Trust: 1.0

db:SECUNIAid:21767

Trust: 1.0

db:SECUNIAid:23155

Trust: 1.0

db:SECUNIAid:22066

Trust: 1.0

db:SECUNIAid:24099

Trust: 1.0

db:SECUNIAid:22446

Trust: 1.0

db:SECUNIAid:22585

Trust: 1.0

db:SECUNIAid:21906

Trust: 1.0

db:SECUNIAid:22799

Trust: 1.0

db:SECUNIAid:23915

Trust: 1.0

db:SECUNIAid:31492

Trust: 1.0

db:SECUNIAid:21873

Trust: 1.0

db:SECUNIAid:22758

Trust: 1.0

db:SECUNIAid:22936

Trust: 1.0

db:SECUNIAid:26329

Trust: 1.0

db:SECUNIAid:23455

Trust: 1.0

db:SECUNIAid:22689

Trust: 1.0

db:SECUNIAid:22232

Trust: 1.0

db:SECUNIAid:21927

Trust: 1.0

db:SECUNIAid:21870

Trust: 1.0

db:SECUNIAid:21823

Trust: 1.0

db:SECUNIAid:24930

Trust: 1.0

db:SECUNIAid:22932

Trust: 1.0

db:SECUNIAid:22934

Trust: 1.0

db:SECUNIAid:22938

Trust: 1.0

db:SECUNIAid:23841

Trust: 1.0

db:SECUNIAid:38567

Trust: 1.0

db:SECUNIAid:21776

Trust: 1.0

db:SECUNIAid:22671

Trust: 1.0

db:SECUNIAid:22733

Trust: 1.0

db:SECUNIAid:22949

Trust: 1.0

db:SECUNIAid:21791

Trust: 1.0

db:SECUNIAid:22044

Trust: 1.0

db:SECUNIAid:22545

Trust: 1.0

db:SECUNIAid:28115

Trust: 1.0

db:SECUNIAid:22036

Trust: 1.0

db:SECUNIAid:24950

Trust: 1.0

db:SECUNIAid:22226

Trust: 1.0

db:SECUNIAid:22948

Trust: 1.0

db:SECUNIAid:21778

Trust: 1.0

db:SECUNIAid:25649

Trust: 1.0

db:SECUNIAid:21785

Trust: 1.0

db:SECUNIAid:22325

Trust: 1.0

db:SECUNIAid:23794

Trust: 1.0

db:SECUNIAid:22937

Trust: 1.0

db:SECUNIAid:22711

Trust: 1.0

db:SECUNIAid:21930

Trust: 1.0

db:SECUNIAid:21982

Trust: 1.0

db:SECUNIAid:22940

Trust: 1.0

db:SECUNIAid:22523

Trust: 1.0

db:SECUNIAid:26893

Trust: 1.0

db:SECUNIAid:41818

Trust: 1.0

db:SECUNIAid:21846

Trust: 1.0

db:SECUNIAid:22161

Trust: 1.0

db:SECUNIAid:22509

Trust: 1.0

db:SECUNIAid:25399

Trust: 1.0

db:SECUNIAid:60799

Trust: 1.0

db:SECUNIAid:21812

Trust: 1.0

db:SECUNIAid:38568

Trust: 1.0

db:SECUNIAid:23680

Trust: 1.0

db:SECUNIAid:22513

Trust: 1.0

db:SECUNIAid:22939

Trust: 1.0

db:SECTRACKid:1016791

Trust: 1.0

db:SECTRACKid:1017522

Trust: 1.0

db:BIDid:28276

Trust: 1.0

db:JVNid:JVN51615542

Trust: 1.0

db:OSVDBid:28549

Trust: 1.0

db:JVNDBid:JVNDB-2012-000079

Trust: 1.0

db:USCERTid:TA06-333A

Trust: 1.0

db:BIDid:20246

Trust: 0.8

db:CERT/CCid:VU#386964

Trust: 0.8

db:SECTRACKid:1017143

Trust: 0.8

db:SECUNIAid:22646

Trust: 0.8

db:SECUNIAid:22207

Trust: 0.8

db:SECUNIAid:22212

Trust: 0.8

db:SECUNIAid:22116

Trust: 0.8

db:SECUNIAid:22216

Trust: 0.8

db:SECUNIAid:22220

Trust: 0.8

db:SECUNIAid:22330

Trust: 0.8

db:SECUNIAid:22130

Trust: 0.8

db:SECUNIAid:22240

Trust: 0.8

db:SECUNIAid:22165

Trust: 0.8

db:SECUNIAid:22166

Trust: 0.8

db:SECUNIAid:22172

Trust: 0.8

db:SECUNIAid:22186

Trust: 0.8

db:SECUNIAid:22193

Trust: 0.8

db:SECUNIAid:22094

Trust: 0.8

db:BIDid:20249

Trust: 0.8

db:SECTRACKid:1016943

Trust: 0.8

db:XFid:29237

Trust: 0.8

db:CERT/CCid:VU#547300

Trust: 0.8

db:SECUNIAid:27421

Trust: 0.8

db:XFid:28755

Trust: 0.8

db:JVNDBid:JVNDB-2007-000772

Trust: 0.8

db:PACKETSTORMid:52186

Trust: 0.1

db:PACKETSTORMid:49782

Trust: 0.1

db:PACKETSTORMid:49955

Trust: 0.1

db:PACKETSTORMid:64684

Trust: 0.1

db:PACKETSTORMid:56053

Trust: 0.1

db:PACKETSTORMid:128056

Trust: 0.1

db:PACKETSTORMid:53990

Trust: 0.1

db:PACKETSTORMid:49826

Trust: 0.1

db:PACKETSTORMid:101257

Trust: 0.1

db:PACKETSTORMid:51167

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#845620 // CERT/CC: VU#594904 // CERT/CC: VU#547300 // BID: 19849 // PACKETSTORM: 52186 // PACKETSTORM: 49782 // PACKETSTORM: 49955 // PACKETSTORM: 64684 // PACKETSTORM: 56053 // PACKETSTORM: 128056 // PACKETSTORM: 53990 // PACKETSTORM: 49826 // PACKETSTORM: 101257 // PACKETSTORM: 51167 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

REFERENCES

url:http://www.securityfocus.com/bid/22083

Trust: 3.4

url:http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

Trust: 2.1

url:http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/

Trust: 1.8

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 1.6

url:http://secunia.com/advisories/23280/

Trust: 1.6

url:http://secunia.com/advisories/23309/

Trust: 1.6

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 1.4

url:http://www.vmware.com/support/server/doc/releasenotes_server.html

Trust: 1.4

url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=3117

Trust: 1.3

url:http://docs.info.apple.com/article.html?artnum=304829

Trust: 1.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-188.htm

Trust: 1.3

url:http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml

Trust: 1.3

url:http://support.attachmate.com/techdocs/2137.html

Trust: 1.3

url:http://www.openoffice.org/security/cves/cve-2006-4339.html

Trust: 1.3

url:http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html

Trust: 1.3

url:http://www.kb.cert.org/vuls/id/845620

Trust: 1.3

url:http://docs.info.apple.com/article.html?artnum=307177

Trust: 1.3

url:https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html

Trust: 1.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1

Trust: 1.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1

Trust: 1.3

url:http://www.sybase.com/detail?id=1047991

Trust: 1.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339

Trust: 1.3

url:http://www.vmware.com/support/player/doc/releasenotes_player.html

Trust: 1.1

url:http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

Trust: 1.1

url:http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

Trust: 1.1

url:http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html

Trust: 1.1

url:http://www.vmware.com/support/player2/doc/releasenotes_player2.html

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-200609-05.xml

Trust: 1.1

url:http://secunia.com/advisories/22939

Trust: 1.0

url:https://issues.rpath.com/browse/rpl-1633

Trust: 1.0

url:http://securitytracker.com/id?1016791

Trust: 1.0

url:http://www.opera.com/support/search/supsearch.dml?index=845

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3453

Trust: 1.0

url:http://www.osvdb.org/28549

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/0254

Trust: 1.0

url:http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540

Trust: 1.0

url:http://secunia.com/advisories/23841

Trust: 1.0

url:http://secunia.com/advisories/60799

Trust: 1.0

url:http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html

Trust: 1.0

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c01070495

Trust: 1.0

url:http://www.securityfocus.com/archive/1/450327/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/22161

Trust: 1.0

url:http://secunia.com/advisories/23455

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4206

Trust: 1.0

url:http://secunia.com/advisories/22585

Trust: 1.0

url:http://secunia.com/advisories/22044

Trust: 1.0

url:http://secunia.com/advisories/21791

Trust: 1.0

url:http://secunia.com/advisories/22446

Trust: 1.0

url:http://support.attachmate.com/techdocs/2127.html

Trust: 1.0

url:http://secunia.com/advisories/21709

Trust: 1.0

url:http://www.us.debian.org/security/2006/dsa-1173

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html

Trust: 1.0

url:http://openvpn.net/changelog.html

Trust: 1.0

url:http://lists.vmware.com/pipermail/security-announce/2008/000008.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4417

Trust: 1.0

url:http://secunia.com/advisories/22758

Trust: 1.0

url:http://secunia.com/advisories/22284

Trust: 1.0

url:http://www.openbsd.org/errata.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/489739/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/21870

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4744

Trust: 1.0

url:http://secunia.com/advisories/22226

Trust: 1.0

url:http://secunia.com/advisories/23155

Trust: 1.0

url:https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144

Trust: 1.0

url:http://secunia.com/advisories/21852

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1

Trust: 1.0

url:http://secunia.com/advisories/21906

Trust: 1.0

url:http://www.vupen.com/english/advisories/2010/0366

Trust: 1.0

url:http://secunia.com/advisories/21930

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3793

Trust: 1.0

url:http://secunia.com/advisories/22733

Trust: 1.0

url:http://jvn.jp/en/jp/jvn51615542/index.html

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_61_opera.html

Trust: 1.0

url:http://secunia.com/advisories/22066

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2008-0629.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3936

Trust: 1.0

url:http://secunia.com/advisories/22937

Trust: 1.0

url:http://secunia.com/advisories/26893

Trust: 1.0

url:http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html

Trust: 1.0

url:ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc

Trust: 1.0

url:http://secunia.com/advisories/22938

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:207

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=130497311408250&w=2

Trust: 1.0

url:http://secunia.com/advisories/21812

Trust: 1.0

url:http://secunia.com/advisories/41818

Trust: 1.0

url:http://secunia.com/advisories/22545

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1815

Trust: 1.0

url:http://www.securityfocus.com/bid/28276

Trust: 1.0

url:http://marc.info/?l=bind-announce&m=116253119512445&w=2

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2783

Trust: 1.0

url:http://secunia.com/advisories/24099

Trust: 1.0

url:http://www.serv-u.com/releasenotes/

Trust: 1.0

url:http://secunia.com/advisories/21846

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html

Trust: 1.0

url:http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml

Trust: 1.0

url:http://secunia.com/advisories/31492

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4327

Trust: 1.0

url:http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html

Trust: 1.0

url:http://secunia.com/advisories/21776

Trust: 1.0

url:http://www.securityfocus.com/archive/1/445231/100/0/threaded

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1401

Trust: 1.0

url:http://secunia.com/advisories/22523

Trust: 1.0

url:http://secunia.com/advisories/38567

Trust: 1.0

url:http://www.us-cert.gov/cas/techalerts/ta06-333a.html

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1

Trust: 1.0

url:http://dev2dev.bea.com/pub/advisory/238

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:161

Trust: 1.0

url:http://www.securityfocus.com/bid/19849

Trust: 1.0

url:http://secunia.com/advisories/28115

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/5146

Trust: 1.0

url:http://www.debian.org/security/2006/dsa-1174

Trust: 1.0

url:http://secunia.com/advisories/21823

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1

Trust: 1.0

url:http://secunia.com/advisories/22232

Trust: 1.0

url:http://secunia.com/advisories/21785

Trust: 1.0

url:http://secunia.com/advisories/22932

Trust: 1.0

url:http://secunia.com/advisories/22036

Trust: 1.0

url:http://secunia.com/advisories/22949

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1945

Trust: 1.0

url:http://secunia.com/advisories/22513

Trust: 1.0

url:http://secunia.com/advisories/25284

Trust: 1.0

url:http://secunia.com/advisories/25399

Trust: 1.0

url:http://securitytracker.com/id?1017522

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4207

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4216

Trust: 1.0

url:https://issues.rpath.com/browse/rpl-616

Trust: 1.0

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2163

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1

Trust: 1.0

url:http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:177

Trust: 1.0

url:http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html

Trust: 1.0

url:http://secunia.com/advisories/22259

Trust: 1.0

url:http://secunia.com/advisories/22260

Trust: 1.0

url:http://secunia.com/advisories/21873

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/4224

Trust: 1.0

url:http://www.vupen.com/english/advisories/2008/0905/references

Trust: 1.0

url:http://secunia.com/advisories/21927

Trust: 1.0

url:http://secunia.com/advisories/23680

Trust: 1.0

url:http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742

Trust: 1.0

url:http://secunia.com/advisories/21982

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:178

Trust: 1.0

url:http://secunia.com/advisories/24930

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/0343

Trust: 1.0

url:http://secunia.com/advisories/21767

Trust: 1.0

url:http://secunia.com/advisories/22799

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3748

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1

Trust: 1.0

url:http://secunia.com/advisories/23915

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4586

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28755

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3899

Trust: 1.0

url:http://secunia.com/advisories/21778

Trust: 1.0

url:http://secunia.com/advisories/22711

Trust: 1.0

url:http://secunia.com/advisories/22940

Trust: 1.0

url:http://secunia.com/advisories/22689

Trust: 1.0

url:http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html

Trust: 1.0

url:http://secunia.com/advisories/38568

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_26_sr.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0073.html

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_55_ssl.html

Trust: 1.0

url:http://secunia.com/advisories/22948

Trust: 1.0

url:http://secunia.com/advisories/22671

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2006-0661.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/445822/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/25649

Trust: 1.0

url:http://www.vmware.com/security/advisories/vmsa-2008-0005.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3566

Trust: 1.0

url:http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf

Trust: 1.0

url:http://secunia.com/advisories/22325

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4205

Trust: 1.0

url:http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4366

Trust: 1.0

url:http://secunia.com/advisories/24950

Trust: 1.0

url:http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2315

Trust: 1.0

url:http://www.securityfocus.com/archive/1/456546/100/200/threaded

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4750

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0072.html

Trust: 1.0

url:http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html

Trust: 1.0

url:http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html

Trust: 1.0

url:http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0062.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3730

Trust: 1.0

url:http://secunia.com/advisories/22509

Trust: 1.0

url:http://secunia.com/advisories/22934

Trust: 1.0

url:http://secunia.com/advisories/22936

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656

Trust: 1.0

url:http://security.gentoo.org/glsa/glsa-200609-18.xml

Trust: 1.0

url:http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml

Trust: 1.0

url:http://support.attachmate.com/techdocs/2128.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-339-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4329

Trust: 1.0

url:http://secunia.com/advisories/23794

Trust: 1.0

url:http://secunia.com/advisories/26329

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1

Trust: 1.0

url:http://jvn.jp/cert/jvnvu%23386964/index.html

Trust: 0.8

url:http://www.securityfocus.com/bid/20246

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 0.8

url:http://secunia.com/advisories/21709/

Trust: 0.8

url:http://www.rsasecurity.com/rsalabs/node.asp?id=2125

Trust: 0.8

url:http://www.ietf.org/rfc/rfc3447.txt

Trust: 0.8

url:http://www.sun.com/software/products/appsrvr/index.xml

Trust: 0.8

url:http://www.sun.com/download/products.xml?id=438cfb75

Trust: 0.8

url:http://www.sun.com/download/products.xml?id=43a84f89

Trust: 0.8

url:http://www.mozilla.org/projects/security/pki/nss/

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102670-1

Trust: 0.8

url:http://en.wikipedia.org/wiki/ssl

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/4299

Trust: 0.8

url:http://securitytracker.com/id?1017143

Trust: 0.8

url:http://secunia.com/advisories/22646

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23547300/index.html

Trust: 0.8

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-september/049715.html

Trust: 0.8

url:https://issues.rpath.com/browse/rpl-613

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 0.8

url:http://kolab.org/security/kolab-vendor-notice-11.txt

Trust: 0.8

url:http://openvpn.net/changelog.html

Trust: 0.8

url:http://www.serv-u.com/releasenotes/

Trust: 0.8

url:http://openbsd.org/errata.html#openssl2

Trust: 0.8

url:http://www.securityfocus.com/bid/20249

Trust: 0.8

url:http://securitytracker.com/id?1016943

Trust: 0.8

url:http://secunia.com/advisories/22130

Trust: 0.8

url:http://secunia.com/advisories/22094

Trust: 0.8

url:http://secunia.com/advisories/22165

Trust: 0.8

url:http://secunia.com/advisories/22186

Trust: 0.8

url:http://secunia.com/advisories/22193

Trust: 0.8

url:http://secunia.com/advisories/22207

Trust: 0.8

url:http://secunia.com/advisories/22259

Trust: 0.8

url:http://secunia.com/advisories/22260

Trust: 0.8

url:http://secunia.com/advisories/22166

Trust: 0.8

url:http://secunia.com/advisories/22172

Trust: 0.8

url:http://secunia.com/advisories/22212

Trust: 0.8

url:http://secunia.com/advisories/22240

Trust: 0.8

url:http://secunia.com/advisories/22216

Trust: 0.8

url:http://secunia.com/advisories/22116

Trust: 0.8

url:http://secunia.com/advisories/22220

Trust: 0.8

url:http://secunia.com/advisories/22284

Trust: 0.8

url:http://secunia.com/advisories/22330

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/29237

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2006-4339

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5810

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/3666

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/28755

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4339

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5810

Trust: 0.8

url:http://secunia.com/advisories/27421

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1&searchclause=

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2006-2937

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2006-2940

Trust: 0.4

url:http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-196.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-224.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-246.htm

Trust: 0.3

url:http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php

Trust: 0.3

url:http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445&w=2

Trust: 0.3

url:http://www.bluecoat.com

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html

Trust: 0.3

url:http://www.cdc.informatik.tu-darmstadt.de/securebrowser/

Trust: 0.3

url:http://www.ipcop.org/modules.php?op=modload&name=news&file=article&sid=31&mode=thread&order=0&thold=0

Trust: 0.3

url:http://www.mozilla.org/security/announce/2006/mfsa2006-60.html

Trust: 0.3

url:http://www.mozilla.org/security/announce/2006/mfsa2006-66.html

Trust: 0.3

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc

Trust: 0.3

url:http://www.ingate.com/relnote-451.php

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0735.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0661.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0675.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0676.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0677.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0733.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0734.html

Trust: 0.3

url:http://www.ssh.com/company/news/2006/english/security/article/786/

Trust: 0.3

url:http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf

Trust: 0.3

url:http://www1.vandyke.com/support/advisory/2007/01/845620.html

Trust: 0.3

url:http://www.slackware.com/security/list.php?l=slackware-security&y=2006

Trust: 0.3

url:http://www.cyberguard.info/snapgear/releases.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1&searchclause=

Trust: 0.3

url:/archive/1/446038

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2007-091.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-250.htm

Trust: 0.3

url:https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053

Trust: 0.3

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475&docid=c00774579

Trust: 0.3

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2007-0062.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0072.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0264.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0525.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0629.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1&searchclause=

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/594904

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-4343

Trust: 0.3

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.3

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-3738

Trust: 0.3

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.3

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.3

url:http://security.gentoo.org/

Trust: 0.3

url:https://bugs.gentoo.org.

Trust: 0.3

url:http://www.mandriva.com/security/

Trust: 0.2

url:http://www.mandriva.com/security/advisories

Trust: 0.2

url:http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_sparc.deb

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m-1sarge2.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m-1sarge2.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/openssl096_0.9.6m.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_m68k.deb

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_powerpc.deb

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl096/libssl0.9.6_0.9.6m-1sarge2_s390.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5618

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1361

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1340

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2940

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5269

Trust: 0.1

url:http://www.vmware.com/download/ace/

Trust: 0.1

url:http://www.vmware.com/download/player/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1362

Trust: 0.1

url:http://www.vmware.com/security

Trust: 0.1

url:http://www.vmware.com/download/ws/ws5.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5269

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1363

Trust: 0.1

url:http://www.vmware.com/download/fusion/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5618

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0923

Trust: 0.1

url:http://www.vmware.com/download/ws/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4343

Trust: 0.1

url:http://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1364

Trust: 0.1

url:http://www.vmware.com/support/policies/eos.html

Trust: 0.1

url:http://www.vmware.com/download/server/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1340

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1364

Trust: 0.1

url:http://www.vmware.com/support/fusion/doc/releasenotes_fusion.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1362

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:http://www.vmware.com/support/policies/eos_vi.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2937

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0494

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0493

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001167-v51bb27-es-20070321

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001163-v51bb26-es-20070315

Trust: 0.1

url:http://h30097.www3.hp.com/cma/patches.html

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=duxkit1001165-v40fb22-es-20070316

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001166-v40gb22-es-20070316

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001160-v51ab24-es-20070314

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3302

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0201

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2950

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3451

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4643

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0201

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0395

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0247

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0247

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2936

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2713

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3689

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3301

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4253

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0217

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0200

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3301

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2334

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3454

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201408-19.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2334

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2950

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2665

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3453

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3453

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2935

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0395

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3451

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3302

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2936

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3454

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2935

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0200

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0217

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4339

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2713

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2149

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2665

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3689

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4253

Trust: 0.1

url:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayproductinfo.pl?productnumber=hpuxwssuite

Trust: 0.1

url:http://software.hp.com/portal/swdepot/displayproductinfo.do?productnumber=b6834aa

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2969

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2002-0840

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2004-0492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3918

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2003-0542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3747

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3291

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2002-0839

Trust: 0.1

url:http://h71000.www7.hp.com/openvms/products/ips/apache/csws_php.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3357

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-3352

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2491

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-5000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3095

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3555

Trust: 0.1

url:http://h71000.www7.hp.com/openvms/products/ips/apache/csws.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-6388

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-1891

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4340

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200610-06.xml

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#845620 // CERT/CC: VU#594904 // CERT/CC: VU#547300 // BID: 19849 // PACKETSTORM: 52186 // PACKETSTORM: 49782 // PACKETSTORM: 49955 // PACKETSTORM: 64684 // PACKETSTORM: 56053 // PACKETSTORM: 128056 // PACKETSTORM: 53990 // PACKETSTORM: 49826 // PACKETSTORM: 101257 // PACKETSTORM: 51167 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

CREDITS

Daniel Bleichenbacher reported this issue to the vendor.

Trust: 0.3

sources: BID: 19849

SOURCES

db:CERT/CCid:VU#386964
db:CERT/CCid:VU#845620
db:CERT/CCid:VU#594904
db:CERT/CCid:VU#547300
db:BIDid:19849
db:PACKETSTORMid:52186
db:PACKETSTORMid:49782
db:PACKETSTORMid:49955
db:PACKETSTORMid:64684
db:PACKETSTORMid:56053
db:PACKETSTORMid:128056
db:PACKETSTORMid:53990
db:PACKETSTORMid:49826
db:PACKETSTORMid:101257
db:PACKETSTORMid:51167
db:JVNDBid:JVNDB-2007-000772
db:NVDid:CVE-2006-4339

LAST UPDATE DATE

2025-09-22T21:10:44.023000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#386964date:2011-07-22T00:00:00
db:CERT/CCid:VU#845620date:2007-02-08T00:00:00
db:CERT/CCid:VU#594904date:2007-02-09T00:00:00
db:CERT/CCid:VU#547300date:2011-07-22T00:00:00
db:BIDid:19849date:2015-03-19T08:19:00
db:JVNDBid:JVNDB-2007-000772date:2014-05-23T00:00:00
db:NVDid:CVE-2006-4339date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#386964date:2006-09-28T00:00:00
db:CERT/CCid:VU#845620date:2006-09-11T00:00:00
db:CERT/CCid:VU#594904date:2007-02-08T00:00:00
db:CERT/CCid:VU#547300date:2006-09-28T00:00:00
db:BIDid:19849date:2006-09-05T00:00:00
db:PACKETSTORMid:52186date:2006-11-16T16:32:32
db:PACKETSTORMid:49782date:2006-09-07T09:27:43
db:PACKETSTORMid:49955date:2006-09-13T08:51:49
db:PACKETSTORMid:64684date:2008-03-19T02:18:56
db:PACKETSTORMid:56053date:2007-04-19T00:58:08
db:PACKETSTORMid:128056date:2014-09-02T06:19:02
db:PACKETSTORMid:53990date:2007-01-27T02:35:42
db:PACKETSTORMid:49826date:2006-09-08T06:46:12
db:PACKETSTORMid:101257date:2011-05-10T00:45:11
db:PACKETSTORMid:51167date:2006-10-20T22:34:17
db:JVNDBid:JVNDB-2007-000772date:2008-05-21T00:00:00
db:NVDid:CVE-2006-4339date:2006-09-05T17:04:00