ID

VAR-201105-0121


CVE

CVE-2011-0419


TITLE

Apache Portable Runtime Used in products such as libraries apr_fnmatch.c and fnmatch.c Service disruption in (CPU And memory consumption ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-001638

DESCRIPTION

Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. It mainly provides an underlying support interface library for upper-level applications that can be used across multiple operating system platforms. NetBSD is a free and open source Unix-like operating system developed by the NetBSD Foundation. This update fixes this problem (CVE-2011-1928). For reference, the description of the original DSA, which fixed CVE-2011-0419: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. This could be used in a denial of service attack. For the oldstable distribution (lenny), this problem has been fixed in version 1.2.12-5+lenny4. For the stable distribution (squeeze), this problem has been fixed in version 1.4.2-6+squeeze2. For the testing distribution (wheezy), this problem will be fixed in version 1.4.5-1. For the unstable distribution (sid), this problem will be fixed in version 1.4.5-1. We recommend that you upgrade your apr packages and restart the apache2 server. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . Release Date: 2011-09-08 Last Updated: 2011-09-08 ------------------------------------------------------------------------------ Potential Security Impact: Remote Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX Apache Web Server. These vulnerability could be exploited remotely to create a Denial of Service (DoS). References: CVE-2011-3192, CVE-2011-0419 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.15 or earlier BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION This bulletin will be revised when additional information becomes available. HP has provided the following software update to resolve this vulnerability. The update is available for download from the following location ftp://srt10606:P2xg=AD5@ftp.usa.hp.com or https://ftp.usa.hp.com/hprc/home with username srt10606 and password P2xg=AD5 HP-UX Web Server Suite v.3.18 containing Apache v2.2.15.08 HP-UX 11i Release Apache Depot name B.11.23 (32-bit) / Apache-CVE-2011-3192-Fix-IA-PA-32.depot B.11.23 (64-bit) / Apache-CVE-2011-3192-Fix-IA-PA-64.depot B.11.31 (32-bit) / Apache-CVE-2011-3192-Fix-IA-PA-32.depot B.11.31 (64-bit) / Apache-CVE-2011-3192-Fix-IA-PA-64.depot For customers not wanting to install this preliminary patch, we recommend that three work arounds be considered from the Apache Software Foundation. 1) Use SetEnvIf or mod_rewrite to detect a large number of ranges and then either ignore the Range: header or reject the request. 2) Limit the size of the request field to a few hundred bytes. 3) Use mod_headers to completely disallow the use of Range headers. Please refer to the Apache advisory for details. http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110826103531.998348F82@minotaur.apache.org%3e MANUAL ACTIONS: Yes - Update Install HP-UX Web Server Suite v3.18 or subsequent. PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX Web Server Suite v3.18 HP-UX B.11.23 HP-UX B.11.31 ================== hpuxws22APCH32.APACHE hpuxws22APCH32.APACHE2 hpuxws22APCH32.AUTH_LDAP hpuxws22APCH32.AUTH_LDAP2 hpuxws22APCH32.MOD_JK hpuxws22APCH32.MOD_JK2 hpuxws22APCH32.MOD_PERL hpuxws22APCH32.MOD_PERL2 hpuxws22APCH32.PHP hpuxws22APCH32.PHP2 hpuxws22APCH32.WEBPROXY hpuxws22APCH32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.15.08 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 8 September 2011 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2011 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ========================================================================== Ubuntu Security Notice USN-1134-1 May 24, 2011 apache2, apr vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS - Ubuntu 6.06 LTS Summary: A denial of service issue exists that affects the Apache web server. (CVE-2011-0419) Is was discovered that the fix for CVE-2011-0419 introduced a different flaw in the fnmatch() implementation that could also result in a denial of service. (CVE-2011-1928) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.04: libapr1 1.4.2-7ubuntu2.1 Ubuntu 10.10: libapr1 1.4.2-3ubuntu1.1 Ubuntu 10.04 LTS: libapr1 1.3.8-1ubuntu0.3 Ubuntu 8.04 LTS: libapr1 1.2.11-1ubuntu0.2 Ubuntu 6.06 LTS: libapr0 2.0.55-4ubuntu2.13 After a standard system update you need to restart the Apache web server or any other service that depends on the APR library to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: JBoss Enterprise Web Server 1.0.2 update Advisory ID: RHSA-2011:0897-01 Product: JBoss Enterprise Web Server Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0897.html Issue date: 2011-06-22 CVE Names: CVE-2010-1157 CVE-2010-1452 CVE-2010-1623 CVE-2010-3718 CVE-2010-4172 CVE-2011-0013 CVE-2011-0419 ===================================================================== 1. Summary: JBoss Enterprise Web Server 1.0.2 is now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: JBoss Enterprise Web Server 1.0 for RHEL 4 AS - i386, noarch, x86_64 JBoss Enterprise Web Server 1.0 for RHEL 4 ES - i386, noarch, x86_64 JBoss Enterprise Web Server 1.0 for RHEL 5 Server - i386, noarch, x86_64 JBoss Enterprise Web Server 1.0 for RHEL 6 Server - i386, noarch, x86_64 3. Description: JBoss Enterprise Web Server is a fully-integrated and certified set of components for hosting Java web applications. This is the first release of JBoss Enterprise Web Server for Red Hat Enterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, this release serves as a replacement for JBoss Enterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to the Release Notes, linked in the References, for more information. This update corrects security flaws in the following components: tomcat6: A cross-site scripting (XSS) flaw was found in the Manager application, used for managing web applications on Apache Tomcat. If a remote attacker could trick a user who is logged into the Manager application into visiting a specially-crafted URL, the attacker could perform Manager application tasks with the privileges of the logged in user. (CVE-2010-4172) tomcat5 and tomcat6: It was found that web applications could modify the location of the Apache Tomcat host's work directory. As web applications deployed on Tomcat have read and write access to this directory, a malicious web application could use this flaw to trick Tomcat into giving it read and write access to an arbitrary directory on the file system. (CVE-2010-3718) A second cross-site scripting (XSS) flaw was found in the Manager application. A malicious web application could use this flaw to conduct an XSS attack, leading to arbitrary web script execution with the privileges of victims who are logged into and viewing Manager application web pages. (CVE-2011-0013) A possible minor information leak was found in the way Apache Tomcat generated HTTP BASIC and DIGEST authentication requests. For configurations where a realm name was not specified and Tomcat was accessed via a proxy, the default generated realm contained the hostname and port used by the proxy to send requests to the Tomcat server. (CVE-2010-1157) httpd: A flaw was found in the way the mod_dav module of the Apache HTTP Server handled certain requests. If a remote attacker were to send a carefully crafted request to the server, it could cause the httpd child process to crash. (CVE-2010-1452) apr: It was found that the apr_fnmatch() function used an unconstrained recursion when processing patterns with the '*' wildcard. An attacker could use this flaw to cause an application using this function, which also accepted untrusted input as a pattern for matching (such as an httpd server using the mod_autoindex module), to exhaust all stack memory or use an excessive amount of CPU time when performing matching. (CVE-2011-0419) apr-util: It was found that certain input could cause the apr-util library to allocate more memory than intended in the apr_brigade_split_line() function. An attacker able to provide input in small chunks to an application using the apr-util library (such as httpd) could possibly use this flaw to trigger high memory consumption. Note: This issue only affected the JBoss Enterprise Web Server packages on Red Hat Enterprise Linux 4. (CVE-2010-1623) All users of JBoss Enterprise Web Server 1.0.1 are advised to upgrade to JBoss Enterprise Web Server 1.0.2, which corrects these issues. After installing this update, the relevant Apache Tomcat service ("tomcat5" or "tomcat6") and the Apache HTTP Server ("httpd") must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 585331 - CVE-2010-1157 tomcat: information disclosure in authentication headers 618189 - CVE-2010-1452 httpd mod_cache, mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments 640281 - CVE-2010-1623 apr-util: high memory consumption in apr_brigade_split_line() 656246 - CVE-2010-4172 tomcat: cross-site-scripting vulnerability in the manager application 675786 - CVE-2011-0013 tomcat: XSS vulnerability in HTML Manager interface 675792 - CVE-2010-3718 tomcat: file permission bypass flaw 677655 - JBEWS 1.0.2 release tracker bug for RHEL 4 677657 - JBEWS 1.0.2 release tracker bug for RHEL-5 677659 - JBEWS 1.0.2 release tracker bug for RHEL-6 703390 - CVE-2011-0419 apr: unconstrained recursion in apr_fnmatch 6. Package List: JBoss Enterprise Web Server 1.0 for RHEL 4 AS: Source: ant-1.7.1-13.jdk6.ep5.el4.src.rpm antlr-2.7.7-7.ep5.el4.src.rpm bcel-5.2-8.1.ep5.el4.src.rpm cglib-2.2-5.1.1.jdk6.ep5.el4.src.rpm dom4j-1.6.1-11.ep5.el4.src.rpm ecj-3.3.1.1-3.2.2.jdk6.ep5.el4.src.rpm glassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.src.rpm glassfish-javamail-1.4.2-0.4.ep5.el4.src.rpm glassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.src.rpm hibernate3-3.3.2-1.5.GA_CP04.ep5.el4.src.rpm hibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.src.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el4.src.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.src.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.src.rpm httpd22-2.2.17-14.ep5.el4.src.rpm jakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-chain-1.2-2.2.ep5.el4.src.rpm jakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-collections-3.2.1-4.ep5.el4.src.rpm jakarta-commons-daemon-1.0.5-1.ep5.el4.src.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.src.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el4.src.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.src.rpm jakarta-commons-el-1.0-19.2.jdk6.ep5.el4.src.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el4.src.rpm jakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.src.rpm jakarta-commons-launcher-1.1-4.6.1.ep5.el4.src.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.src.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.src.rpm jakarta-commons-modeler-2.0-4.ep5.el4.src.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.src.rpm jakarta-commons-validator-1.3.1-7.5.1.ep5.el4.src.rpm jakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.src.rpm jakarta-taglibs-standard-1.1.1-9.ep5.el4.src.rpm javassist-3.12.0-1.jdk6.ep5.el4.src.rpm jboss-common-core-2.2.17-1.ep5.el4.src.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el4.src.rpm jboss-common-logging-spi-2.1.2-1.ep5.el4.src.rpm jboss-javaee-5.0.1-2.9.ep5.el4.src.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el4.src.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.src.rpm log4j-1.2.14-18.1.jdk6.ep5.el4.src.rpm mod_cluster-1.0.10-2.GA_CP01.ep5.el4.src.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.src.rpm mod_jk-1.2.31-1.ep5.el4.src.rpm mx4j-3.0.1-9.3.4.ep5.el4.src.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el4.src.rpm regexp-1.5-1.2.1.jdk6.ep5.el4.src.rpm struts12-1.2.9-3.ep5.el4.src.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el4.src.rpm tomcat-native-1.1.20-2.0.ep5.el4.src.rpm tomcat5-5.5.33-14_patch_04.ep5.el4.src.rpm tomcat6-6.0.32-15_patch_03.ep5.el4.src.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el4.src.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el4.src.rpm xml-commons-1.3.04-7.12.ep5.el4.src.rpm i386: httpd22-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-util-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-util-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-debuginfo-2.2.17-14.ep5.el4.i386.rpm httpd22-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-manual-2.2.17-14.ep5.el4.i386.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.i386.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.i386.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.i386.rpm mod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.i386.rpm mod_jk-ap20-1.2.31-1.ep5.el4.i386.rpm mod_jk-debuginfo-1.2.31-1.ep5.el4.i386.rpm mod_jk-manual-1.2.31-1.ep5.el4.i386.rpm mod_ssl22-2.2.17-14.ep5.el4.i386.rpm tomcat-native-1.1.20-2.0.ep5.el4.i386.rpm tomcat-native-debuginfo-1.1.20-2.0.ep5.el4.i386.rpm noarch: ant-1.7.1-13.jdk6.ep5.el4.noarch.rpm antlr-2.7.7-7.ep5.el4.noarch.rpm bcel-5.2-8.1.ep5.el4.noarch.rpm cglib-2.2-5.1.1.jdk6.ep5.el4.noarch.rpm dom4j-1.6.1-11.ep5.el4.noarch.rpm ecj-3.3.1.1-3.2.2.jdk6.ep5.el4.noarch.rpm glassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.noarch.rpm glassfish-javamail-1.4.2-0.4.ep5.el4.noarch.rpm glassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.noarch.rpm hibernate3-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm hibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-annotations-javadoc-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el4.noarch.rpm hibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el4.noarch.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.noarch.rpm hibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.jdk6.ep5.el4.noarch.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-javadoc-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm jakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-chain-1.2-2.2.ep5.el4.noarch.rpm jakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-collections-3.2.1-4.ep5.el4.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-4.ep5.el4.noarch.rpm jakarta-commons-daemon-1.0.5-1.ep5.el4.noarch.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el4.noarch.rpm jakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el4.noarch.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-el-1.0-19.2.jdk6.ep5.el4.noarch.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el4.noarch.rpm jakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-launcher-1.1-4.6.1.ep5.el4.noarch.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-modeler-2.0-4.ep5.el4.noarch.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-validator-1.3.1-7.5.1.ep5.el4.noarch.rpm jakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.noarch.rpm jakarta-taglibs-standard-1.1.1-9.ep5.el4.noarch.rpm javassist-3.12.0-1.jdk6.ep5.el4.noarch.rpm jboss-common-core-2.2.17-1.ep5.el4.noarch.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el4.noarch.rpm jboss-common-logging-spi-2.1.2-1.ep5.el4.noarch.rpm jboss-javaee-poms-5.0.1-2.9.ep5.el4.noarch.rpm jboss-jms-1.1-api-5.0.1-2.9.ep5.el4.noarch.rpm jboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el4.noarch.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el4.noarch.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.noarch.rpm log4j-1.2.14-18.1.jdk6.ep5.el4.noarch.rpm mod_cluster-demo-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-jbossas-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-jbossweb2-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-tomcat6-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mx4j-3.0.1-9.3.4.ep5.el4.noarch.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el4.noarch.rpm regexp-1.5-1.2.1.jdk6.ep5.el4.noarch.rpm struts12-1.2.9-3.ep5.el4.noarch.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el4.noarch.rpm tomcat5-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-admin-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-common-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-eclipse-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jsp-2.0-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jsp-2.0-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-parent-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-server-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-servlet-2.4-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-servlet-2.4-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat6-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-admin-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-docs-webapp-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-el-1.0-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-javadoc-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-jsp-2.1-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-lib-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-log4j-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-servlet-2.5-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el4.noarch.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el4.noarch.rpm xml-commons-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-jaxp-1.2-apis-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-jaxp-1.3-apis-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-resolver12-1.3.04-7.12.ep5.el4.noarch.rpm x86_64: httpd22-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-util-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-util-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-debuginfo-2.2.17-14.ep5.el4.x86_64.rpm httpd22-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-manual-2.2.17-14.ep5.el4.x86_64.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.x86_64.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.x86_64.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm mod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm mod_jk-ap20-1.2.31-1.ep5.el4.x86_64.rpm mod_jk-debuginfo-1.2.31-1.ep5.el4.x86_64.rpm mod_jk-manual-1.2.31-1.ep5.el4.x86_64.rpm mod_ssl22-2.2.17-14.ep5.el4.x86_64.rpm tomcat-native-1.1.20-2.0.ep5.el4.x86_64.rpm tomcat-native-debuginfo-1.1.20-2.0.ep5.el4.x86_64.rpm JBoss Enterprise Web Server 1.0 for RHEL 4 ES: Source: ant-1.7.1-13.jdk6.ep5.el4.src.rpm antlr-2.7.7-7.ep5.el4.src.rpm bcel-5.2-8.1.ep5.el4.src.rpm cglib-2.2-5.1.1.jdk6.ep5.el4.src.rpm dom4j-1.6.1-11.ep5.el4.src.rpm ecj-3.3.1.1-3.2.2.jdk6.ep5.el4.src.rpm glassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.src.rpm glassfish-javamail-1.4.2-0.4.ep5.el4.src.rpm glassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.src.rpm hibernate3-3.3.2-1.5.GA_CP04.ep5.el4.src.rpm hibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.src.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el4.src.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.src.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.src.rpm httpd22-2.2.17-14.ep5.el4.src.rpm jakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-chain-1.2-2.2.ep5.el4.src.rpm jakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-collections-3.2.1-4.ep5.el4.src.rpm jakarta-commons-daemon-1.0.5-1.ep5.el4.src.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.src.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el4.src.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.src.rpm jakarta-commons-el-1.0-19.2.jdk6.ep5.el4.src.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el4.src.rpm jakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.src.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.src.rpm jakarta-commons-launcher-1.1-4.6.1.ep5.el4.src.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.src.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.src.rpm jakarta-commons-modeler-2.0-4.ep5.el4.src.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.src.rpm jakarta-commons-validator-1.3.1-7.5.1.ep5.el4.src.rpm jakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.src.rpm jakarta-taglibs-standard-1.1.1-9.ep5.el4.src.rpm javassist-3.12.0-1.jdk6.ep5.el4.src.rpm jboss-common-core-2.2.17-1.ep5.el4.src.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el4.src.rpm jboss-common-logging-spi-2.1.2-1.ep5.el4.src.rpm jboss-javaee-5.0.1-2.9.ep5.el4.src.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el4.src.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.src.rpm log4j-1.2.14-18.1.jdk6.ep5.el4.src.rpm mod_cluster-1.0.10-2.GA_CP01.ep5.el4.src.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.src.rpm mod_jk-1.2.31-1.ep5.el4.src.rpm mx4j-3.0.1-9.3.4.ep5.el4.src.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el4.src.rpm regexp-1.5-1.2.1.jdk6.ep5.el4.src.rpm struts12-1.2.9-3.ep5.el4.src.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el4.src.rpm tomcat-native-1.1.20-2.0.ep5.el4.src.rpm tomcat5-5.5.33-14_patch_04.ep5.el4.src.rpm tomcat6-6.0.32-15_patch_03.ep5.el4.src.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el4.src.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el4.src.rpm xml-commons-1.3.04-7.12.ep5.el4.src.rpm i386: httpd22-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-util-2.2.17-14.ep5.el4.i386.rpm httpd22-apr-util-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-debuginfo-2.2.17-14.ep5.el4.i386.rpm httpd22-devel-2.2.17-14.ep5.el4.i386.rpm httpd22-manual-2.2.17-14.ep5.el4.i386.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.i386.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.i386.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.i386.rpm mod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.i386.rpm mod_jk-ap20-1.2.31-1.ep5.el4.i386.rpm mod_jk-debuginfo-1.2.31-1.ep5.el4.i386.rpm mod_jk-manual-1.2.31-1.ep5.el4.i386.rpm mod_ssl22-2.2.17-14.ep5.el4.i386.rpm tomcat-native-1.1.20-2.0.ep5.el4.i386.rpm tomcat-native-debuginfo-1.1.20-2.0.ep5.el4.i386.rpm noarch: ant-1.7.1-13.jdk6.ep5.el4.noarch.rpm antlr-2.7.7-7.ep5.el4.noarch.rpm bcel-5.2-8.1.ep5.el4.noarch.rpm cglib-2.2-5.1.1.jdk6.ep5.el4.noarch.rpm dom4j-1.6.1-11.ep5.el4.noarch.rpm ecj-3.3.1.1-3.2.2.jdk6.ep5.el4.noarch.rpm glassfish-jaf-1.1.0-6.1.1.jdk6.ep5.el4.noarch.rpm glassfish-javamail-1.4.2-0.4.ep5.el4.noarch.rpm glassfish-jsf-1.2_13-2.2.1.jdk6.ep5.el4.noarch.rpm hibernate3-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm hibernate3-annotations-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-annotations-javadoc-3.4.0-3.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el4.noarch.rpm hibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el4.noarch.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.jdk6.ep5.el4.noarch.rpm hibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.jdk6.ep5.el4.noarch.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el4.noarch.rpm hibernate3-javadoc-3.3.2-1.5.GA_CP04.ep5.el4.noarch.rpm jakarta-commons-beanutils-1.8.0-4.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-chain-1.2-2.2.ep5.el4.noarch.rpm jakarta-commons-codec-1.3-9.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-collections-3.2.1-4.ep5.el4.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-4.ep5.el4.noarch.rpm jakarta-commons-daemon-1.0.5-1.ep5.el4.noarch.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el4.noarch.rpm jakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el4.noarch.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-el-1.0-19.2.jdk6.ep5.el4.noarch.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el4.noarch.rpm jakarta-commons-httpclient-3.1-1.1.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-launcher-1.1-4.6.1.ep5.el4.noarch.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-modeler-2.0-4.ep5.el4.noarch.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el4.noarch.rpm jakarta-commons-validator-1.3.1-7.5.1.ep5.el4.noarch.rpm jakarta-oro-2.0.8-3.3.2.1.jdk6.ep5.el4.noarch.rpm jakarta-taglibs-standard-1.1.1-9.ep5.el4.noarch.rpm javassist-3.12.0-1.jdk6.ep5.el4.noarch.rpm jboss-common-core-2.2.17-1.ep5.el4.noarch.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el4.noarch.rpm jboss-common-logging-spi-2.1.2-1.ep5.el4.noarch.rpm jboss-javaee-poms-5.0.1-2.9.ep5.el4.noarch.rpm jboss-jms-1.1-api-5.0.1-2.9.ep5.el4.noarch.rpm jboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el4.noarch.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el4.noarch.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el4.noarch.rpm log4j-1.2.14-18.1.jdk6.ep5.el4.noarch.rpm mod_cluster-demo-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-jbossas-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-jbossweb2-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mod_cluster-tomcat6-1.0.10-2.GA_CP01.ep5.el4.noarch.rpm mx4j-3.0.1-9.3.4.ep5.el4.noarch.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el4.noarch.rpm regexp-1.5-1.2.1.jdk6.ep5.el4.noarch.rpm struts12-1.2.9-3.ep5.el4.noarch.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el4.noarch.rpm tomcat5-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-admin-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-common-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-eclipse-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jasper-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jsp-2.0-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-jsp-2.0-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-parent-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-server-lib-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-servlet-2.4-api-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-servlet-2.4-api-javadoc-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat5-webapps-5.5.33-14_patch_04.ep5.el4.noarch.rpm tomcat6-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-admin-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-docs-webapp-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-el-1.0-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-javadoc-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-jsp-2.1-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-lib-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-log4j-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-servlet-2.5-api-6.0.32-15_patch_03.ep5.el4.noarch.rpm tomcat6-webapps-6.0.32-15_patch_03.ep5.el4.noarch.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el4.noarch.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el4.noarch.rpm xml-commons-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-jaxp-1.2-apis-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-jaxp-1.3-apis-1.3.04-7.12.ep5.el4.noarch.rpm xml-commons-resolver12-1.3.04-7.12.ep5.el4.noarch.rpm x86_64: httpd22-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-util-2.2.17-14.ep5.el4.x86_64.rpm httpd22-apr-util-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-debuginfo-2.2.17-14.ep5.el4.x86_64.rpm httpd22-devel-2.2.17-14.ep5.el4.x86_64.rpm httpd22-manual-2.2.17-14.ep5.el4.x86_64.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el4.x86_64.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el4.x86_64.rpm mod_cluster-native-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm mod_cluster-native-debuginfo-1.0.10-2.GA_CP01.ep5.el4.x86_64.rpm mod_jk-ap20-1.2.31-1.ep5.el4.x86_64.rpm mod_jk-debuginfo-1.2.31-1.ep5.el4.x86_64.rpm mod_jk-manual-1.2.31-1.ep5.el4.x86_64.rpm mod_ssl22-2.2.17-14.ep5.el4.x86_64.rpm tomcat-native-1.1.20-2.0.ep5.el4.x86_64.rpm tomcat-native-debuginfo-1.1.20-2.0.ep5.el4.x86_64.rpm JBoss Enterprise Web Server 1.0 for RHEL 5 Server: Source: ant-1.7.1-13.jdk6.ep5.el5.src.rpm antlr-2.7.7-7.ep5.el5.src.rpm cglib-2.2-5.1.1.1.jdk6.ep5.el5.src.rpm dom4j-1.6.1-11.ep5.el5.src.rpm ecj3-3.3.1.1-3.1.1.1.jdk6.ep5.el5.src.rpm glassfish-jsf-1.2_13-3.1.1.jdk6.ep5.el5.src.rpm hibernate3-3.3.2-1.4.GA_CP04.ep5.el5.src.rpm hibernate3-annotations-3.4.0-3.2.GA_CP04.ep5.el5.src.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el5.src.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.1.jdk6.ep5.el5.src.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el5.src.rpm httpd-2.2.17-11.1.ep5.el5.src.rpm jakarta-commons-beanutils-1.8.0-4.1.2.1.jdk6.ep5.el5.src.rpm jakarta-commons-chain-1.2-2.2.1.ep5.el5.src.rpm jakarta-commons-codec-1.3-9.2.1.1.jdk6.ep5.el5.src.rpm jakarta-commons-collections-3.2.1-4.1.ep5.el5.src.rpm jakarta-commons-daemon-1.0.5-1.ep5.el5.src.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.src.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el5.src.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el5.src.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el5.src.rpm jakarta-commons-httpclient-3.1-1.2.1.jdk6.ep5.el5.src.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el5.src.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el5.src.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el5.src.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el5.src.rpm jakarta-commons-validator-1.3.1-7.5.2.ep5.el5.src.rpm jakarta-oro-2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.src.rpm jakarta-taglibs-standard-1.1.1-9.1.ep5.el5.src.rpm javassist-3.12.0-1.jdk6.ep5.el5.src.rpm jboss-common-core-2.2.17-1.ep5.el5.src.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el5.src.rpm jboss-common-logging-spi-2.1.2-1.ep5.el5.src.rpm jboss-javaee-5.0.1-2.9.ep5.el5.src.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el5.src.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el5.src.rpm mod_cluster-1.0.10-2.1.GA_CP01.ep5.el5.src.rpm mod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.src.rpm mod_jk-1.2.31-1.1.ep5.el5.src.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el5.src.rpm struts12-1.2.9-3.1.ep5.el5.src.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el5.src.rpm tomcat-native-1.1.20-2.1.ep5.el5.src.rpm tomcat5-5.5.33-16_patch_04.ep5.el5.src.rpm tomcat6-6.0.32-15.1_patch_03.ep5.el5.src.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el5.src.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el5.src.rpm xml-commons-1.3.04-7.10.jdk6.ep5.el5.src.rpm i386: httpd-2.2.17-11.1.ep5.el5.i386.rpm httpd-debuginfo-2.2.17-11.1.ep5.el5.i386.rpm httpd-devel-2.2.17-11.1.ep5.el5.i386.rpm httpd-manual-2.2.17-11.1.ep5.el5.i386.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.i386.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el5.i386.rpm mod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.i386.rpm mod_cluster-native-debuginfo-1.0.10-2.1.GA_CP01.ep5.el5.i386.rpm mod_jk-ap20-1.2.31-1.1.ep5.el5.i386.rpm mod_jk-debuginfo-1.2.31-1.1.ep5.el5.i386.rpm mod_jk-manual-1.2.31-1.1.ep5.el5.i386.rpm mod_ssl-2.2.17-11.1.ep5.el5.i386.rpm tomcat-native-1.1.20-2.1.ep5.el5.i386.rpm tomcat-native-debuginfo-1.1.20-2.1.ep5.el5.i386.rpm noarch: ant-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-antlr-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-bcel-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-bsf-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-log4j-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-oro-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-regexp-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-apache-resolver-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-commons-logging-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-javamail-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-jdepend-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-jmf-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-jsch-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-junit-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-nodeps-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-scripts-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-swing-1.7.1-13.jdk6.ep5.el5.noarch.rpm ant-trax-1.7.1-13.jdk6.ep5.el5.noarch.rpm antlr-2.7.7-7.ep5.el5.noarch.rpm cglib-2.2-5.1.1.1.jdk6.ep5.el5.noarch.rpm dom4j-1.6.1-11.ep5.el5.noarch.rpm ecj3-3.3.1.1-3.1.1.1.jdk6.ep5.el5.noarch.rpm glassfish-jsf-1.2_13-3.1.1.jdk6.ep5.el5.noarch.rpm hibernate3-3.3.2-1.4.GA_CP04.ep5.el5.noarch.rpm hibernate3-annotations-3.4.0-3.2.GA_CP04.ep5.el5.noarch.rpm hibernate3-annotations-javadoc-3.4.0-3.2.GA_CP04.ep5.el5.noarch.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el5.noarch.rpm hibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el5.noarch.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.1.jdk6.ep5.el5.noarch.rpm hibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.1.jdk6.ep5.el5.noarch.rpm hibernate3-entitymanager-3.4.0-4.3.GA_CP04.ep5.el5.noarch.rpm hibernate3-entitymanager-javadoc-3.4.0-4.3.GA_CP04.ep5.el5.noarch.rpm hibernate3-javadoc-3.3.2-1.4.GA_CP04.ep5.el5.noarch.rpm jakarta-commons-beanutils-1.8.0-4.1.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-chain-1.2-2.2.1.ep5.el5.noarch.rpm jakarta-commons-codec-1.3-9.2.1.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-collections-3.2.1-4.1.ep5.el5.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-4.1.ep5.el5.noarch.rpm jakarta-commons-daemon-1.0.5-1.ep5.el5.noarch.rpm jakarta-commons-dbcp-1.2.1-16.4.ep5.el5.noarch.rpm jakarta-commons-dbcp-tomcat5-1.2.1-16.4.ep5.el5.noarch.rpm jakarta-commons-digester-1.8.1-8.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-fileupload-1.1.1-7.4.ep5.el5.noarch.rpm jakarta-commons-httpclient-3.1-1.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-io-1.4-1.3.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-logging-1.1.1-0.4.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-logging-jboss-1.1-10.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-logging-tomcat6-1.1.1-0.4.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-pool-1.3-11.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-pool-tomcat5-1.3-11.2.1.jdk6.ep5.el5.noarch.rpm jakarta-commons-validator-1.3.1-7.5.2.ep5.el5.noarch.rpm jakarta-oro-2.0.8-3.3.2.1.1.1.jdk6.ep5.el5.noarch.rpm jakarta-taglibs-standard-1.1.1-9.1.ep5.el5.noarch.rpm javassist-3.12.0-1.jdk6.ep5.el5.noarch.rpm jboss-common-core-2.2.17-1.ep5.el5.noarch.rpm jboss-common-logging-jdk-2.1.2-1.ep5.el5.noarch.rpm jboss-common-logging-spi-2.1.2-1.ep5.el5.noarch.rpm jboss-javaee-5.0.1-2.9.ep5.el5.noarch.rpm jboss-javaee-poms-5.0.1-2.9.ep5.el5.noarch.rpm jboss-jms-1.1-api-5.0.1-2.9.ep5.el5.noarch.rpm jboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el5.noarch.rpm jcommon-1.0.16-1.2.1.jdk6.ep5.el5.noarch.rpm jfreechart-1.0.13-2.3.2.1.jdk6.ep5.el5.noarch.rpm mod_cluster-demo-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm mod_cluster-jbossas-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm mod_cluster-jbossweb2-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm mod_cluster-tomcat6-1.0.10-2.1.GA_CP01.ep5.el5.noarch.rpm objectweb-asm-3.1-5.3.1.jdk6.ep5.el5.noarch.rpm struts12-1.2.9-3.1.ep5.el5.noarch.rpm tomcat-jkstatus-ant-1.2.31-2.ep5.el5.noarch.rpm tomcat5-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-admin-webapps-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-common-lib-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jasper-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jasper-eclipse-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jasper-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jsp-2.0-api-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-jsp-2.0-api-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-parent-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-server-lib-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-servlet-2.4-api-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-servlet-2.4-api-javadoc-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat5-webapps-5.5.33-16_patch_04.ep5.el5.noarch.rpm tomcat6-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-admin-webapps-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-docs-webapp-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-el-1.0-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-javadoc-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-jsp-2.1-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-lib-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-log4j-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-servlet-2.5-api-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm tomcat6-webapps-6.0.32-15.1_patch_03.ep5.el5.noarch.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el5.noarch.rpm xerces-j2-2.9.1-3.patch01.1.ep5.el5.noarch.rpm xml-commons-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm xml-commons-jaxp-1.2-apis-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm xml-commons-jaxp-1.3-apis-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm xml-commons-resolver12-1.3.04-7.10.jdk6.ep5.el5.noarch.rpm x86_64: httpd-2.2.17-11.1.ep5.el5.x86_64.rpm httpd-debuginfo-2.2.17-11.1.ep5.el5.x86_64.rpm httpd-devel-2.2.17-11.1.ep5.el5.x86_64.rpm httpd-manual-2.2.17-11.1.ep5.el5.x86_64.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el5.x86_64.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el5.x86_64.rpm mod_cluster-native-1.0.10-2.1.GA_CP01.ep5.el5.x86_64.rpm mod_cluster-native-debuginfo-1.0.10-2.1.GA_CP01.ep5.el5.x86_64.rpm mod_jk-ap20-1.2.31-1.1.ep5.el5.x86_64.rpm mod_jk-debuginfo-1.2.31-1.1.ep5.el5.x86_64.rpm mod_jk-manual-1.2.31-1.1.ep5.el5.x86_64.rpm mod_ssl-2.2.17-11.1.ep5.el5.x86_64.rpm tomcat-native-1.1.20-2.1.ep5.el5.x86_64.rpm tomcat-native-debuginfo-1.1.20-2.1.ep5.el5.x86_64.rpm JBoss Enterprise Web Server 1.0 for RHEL 6 Server: Source: ant-1.7.1-14.ep5.el6.src.rpm antlr-2.7.7-7.ep5.el6.src.rpm cglib-2.2-5.4.ep5.el6.src.rpm dom4j-1.6.1-11.1.ep5.el6.src.rpm ecj3-3.3.1.1-4.ep5.el6.src.rpm glassfish-jsf-1.2_13-3.1.4.ep5.el6.src.rpm hibernate3-3.3.2-1.8.GA_CP04.ep5.el6.src.rpm hibernate3-annotations-3.4.0-3.5.GA_CP04.ep5.el6.src.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el6.src.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.3.ep5.el6.src.rpm hibernate3-entitymanager-3.4.0-4.4.GA_CP04.ep5.el6.src.rpm httpd-2.2.17-11.2.ep5.el6.src.rpm jakarta-commons-beanutils-1.8.0-9.ep5.el6.src.rpm jakarta-commons-chain-1.2-2.2.2.ep5.el6.src.rpm jakarta-commons-codec-1.3-12.1.ep5.el6.src.rpm jakarta-commons-collections-3.2.1-4.ep5.el6.src.rpm jakarta-commons-daemon-1.0.5-1.1.ep5.el6.src.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.src.rpm jakarta-commons-dbcp-1.2.1-16.2.ep5.el6.src.rpm jakarta-commons-digester-1.8.1-8.1.1.1.ep5.el6.src.rpm jakarta-commons-fileupload-1.1.1-7.5.ep5.el6.src.rpm jakarta-commons-httpclient-3.1-1.2.2.ep5.el6.src.rpm jakarta-commons-io-1.4-4.ep5.el6.src.rpm jakarta-commons-logging-1.1.1-1.ep5.el6.src.rpm jakarta-commons-logging-jboss-1.1-10.2.2.1.ep5.el6.src.rpm jakarta-commons-pool-1.3-15.ep5.el6.src.rpm jakarta-commons-validator-1.3.1-7.5.2.ep5.el6.src.rpm jakarta-oro-2.0.8-7.ep5.el6.src.rpm jakarta-taglibs-standard-1.1.1-12.ep5.el6.src.rpm javassist-3.12.0-3.ep5.el6.src.rpm jboss-common-core-2.2.17-1.2.ep5.el6.src.rpm jboss-common-logging-jdk-2.1.2-1.2.ep5.el6.src.rpm jboss-common-logging-spi-2.1.2-1.ep5.el6.src.rpm jboss-javaee-5.0.1-2.9.ep5.el6.src.rpm jcommon-1.0.16-1.2.2.ep5.el6.src.rpm jfreechart-1.0.13-2.3.2.1.2.ep5.el6.src.rpm mod_cluster-1.0.10-2.2.GA_CP01.ep5.el6.src.rpm mod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.src.rpm mod_jk-1.2.31-1.1.2.ep5.el6.src.rpm objectweb-asm31-3.1-12.1.ep5.el6.src.rpm struts12-1.2.9-3.1.ep5.el6.src.rpm tomcat-jkstatus-ant-1.2.31-2.1.ep5.el6.src.rpm tomcat-native-1.1.20-2.1.2.ep5.el6.src.rpm tomcat5-5.5.33-15_patch_04.ep5.el6.src.rpm tomcat6-6.0.32-14_patch_03.ep5.el6.src.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el6.src.rpm xerces-j2-2.9.1-8.patch01.1.ep5.el6.src.rpm xml-commons-1.3.04-7.14.ep5.el6.src.rpm i386: httpd-2.2.17-11.2.ep5.el6.i386.rpm httpd-debuginfo-2.2.17-11.2.ep5.el6.i386.rpm httpd-devel-2.2.17-11.2.ep5.el6.i386.rpm httpd-manual-2.2.17-11.2.ep5.el6.i386.rpm httpd-tools-2.2.17-11.2.ep5.el6.i386.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.i386.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el6.i386.rpm mod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.i386.rpm mod_cluster-native-debuginfo-1.0.10-2.1.1.GA_CP01.ep5.el6.i386.rpm mod_jk-ap20-1.2.31-1.1.2.ep5.el6.i386.rpm mod_jk-debuginfo-1.2.31-1.1.2.ep5.el6.i386.rpm mod_jk-manual-1.2.31-1.1.2.ep5.el6.i386.rpm mod_ssl-2.2.17-11.2.ep5.el6.i386.rpm tomcat-native-1.1.20-2.1.2.ep5.el6.i386.rpm tomcat-native-debuginfo-1.1.20-2.1.2.ep5.el6.i386.rpm noarch: ant-1.7.1-14.ep5.el6.noarch.rpm ant-antlr-1.7.1-14.ep5.el6.noarch.rpm ant-apache-bcel-1.7.1-14.ep5.el6.noarch.rpm ant-apache-bsf-1.7.1-14.ep5.el6.noarch.rpm ant-apache-log4j-1.7.1-14.ep5.el6.noarch.rpm ant-apache-oro-1.7.1-14.ep5.el6.noarch.rpm ant-apache-regexp-1.7.1-14.ep5.el6.noarch.rpm ant-apache-resolver-1.7.1-14.ep5.el6.noarch.rpm ant-commons-logging-1.7.1-14.ep5.el6.noarch.rpm ant-commons-net-1.7.1-14.ep5.el6.noarch.rpm ant-javamail-1.7.1-14.ep5.el6.noarch.rpm ant-jdepend-1.7.1-14.ep5.el6.noarch.rpm ant-jmf-1.7.1-14.ep5.el6.noarch.rpm ant-jsch-1.7.1-14.ep5.el6.noarch.rpm ant-junit-1.7.1-14.ep5.el6.noarch.rpm ant-nodeps-1.7.1-14.ep5.el6.noarch.rpm ant-scripts-1.7.1-14.ep5.el6.noarch.rpm ant-swing-1.7.1-14.ep5.el6.noarch.rpm ant-trax-1.7.1-14.ep5.el6.noarch.rpm antlr-2.7.7-7.ep5.el6.noarch.rpm cglib-2.2-5.4.ep5.el6.noarch.rpm dom4j-1.6.1-11.1.ep5.el6.noarch.rpm ecj3-3.3.1.1-4.ep5.el6.noarch.rpm glassfish-jsf-1.2_13-3.1.4.ep5.el6.noarch.rpm hibernate3-3.3.2-1.8.GA_CP04.ep5.el6.noarch.rpm hibernate3-annotations-3.4.0-3.5.GA_CP04.ep5.el6.noarch.rpm hibernate3-annotations-javadoc-3.4.0-3.5.GA_CP04.ep5.el6.noarch.rpm hibernate3-commons-annotations-3.1.0-1.8.ep5.el6.noarch.rpm hibernate3-commons-annotations-javadoc-3.1.0-1.8.ep5.el6.noarch.rpm hibernate3-ejb-persistence-3.0-api-1.0.2-3.3.ep5.el6.noarch.rpm hibernate3-ejb-persistence-3.0-api-javadoc-1.0.2-3.3.ep5.el6.noarch.rpm hibernate3-entitymanager-3.4.0-4.4.GA_CP04.ep5.el6.noarch.rpm hibernate3-entitymanager-javadoc-3.4.0-4.4.GA_CP04.ep5.el6.noarch.rpm hibernate3-javadoc-3.3.2-1.8.GA_CP04.ep5.el6.noarch.rpm jakarta-commons-beanutils-1.8.0-9.ep5.el6.noarch.rpm jakarta-commons-chain-1.2-2.2.2.ep5.el6.noarch.rpm jakarta-commons-codec-1.3-12.1.ep5.el6.noarch.rpm jakarta-commons-collections-3.2.1-4.ep5.el6.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-4.ep5.el6.noarch.rpm jakarta-commons-daemon-1.0.5-1.1.ep5.el6.noarch.rpm jakarta-commons-dbcp-1.2.1-16.2.ep5.el6.noarch.rpm jakarta-commons-dbcp-tomcat5-1.2.1-16.2.ep5.el6.noarch.rpm jakarta-commons-digester-1.8.1-8.1.1.1.ep5.el6.noarch.rpm jakarta-commons-fileupload-1.1.1-7.5.ep5.el6.noarch.rpm jakarta-commons-httpclient-3.1-1.2.2.ep5.el6.noarch.rpm jakarta-commons-io-1.4-4.ep5.el6.noarch.rpm jakarta-commons-logging-1.1.1-1.ep5.el6.noarch.rpm jakarta-commons-logging-jboss-1.1-10.2.2.1.ep5.el6.noarch.rpm jakarta-commons-logging-tomcat6-1.1.1-1.ep5.el6.noarch.rpm jakarta-commons-pool-1.3-15.ep5.el6.noarch.rpm jakarta-commons-pool-tomcat5-1.3-15.ep5.el6.noarch.rpm jakarta-commons-validator-1.3.1-7.5.2.ep5.el6.noarch.rpm jakarta-oro-2.0.8-7.ep5.el6.noarch.rpm jakarta-taglibs-standard-1.1.1-12.ep5.el6.noarch.rpm javassist-3.12.0-3.ep5.el6.noarch.rpm jboss-common-core-2.2.17-1.2.ep5.el6.noarch.rpm jboss-common-logging-jdk-2.1.2-1.2.ep5.el6.noarch.rpm jboss-common-logging-spi-2.1.2-1.ep5.el6.noarch.rpm jboss-javaee-5.0.1-2.9.ep5.el6.noarch.rpm jboss-javaee-poms-5.0.1-2.9.ep5.el6.noarch.rpm jboss-jms-1.1-api-5.0.1-2.9.ep5.el6.noarch.rpm jboss-transaction-1.0.1-api-5.0.1-2.9.ep5.el6.noarch.rpm jcommon-1.0.16-1.2.2.ep5.el6.noarch.rpm jfreechart-1.0.13-2.3.2.1.2.ep5.el6.noarch.rpm mod_cluster-demo-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm mod_cluster-jbossas-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm mod_cluster-jbossweb2-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm mod_cluster-tomcat6-1.0.10-2.2.GA_CP01.ep5.el6.noarch.rpm objectweb-asm31-3.1-12.1.ep5.el6.noarch.rpm struts12-1.2.9-3.1.ep5.el6.noarch.rpm tomcat-jkstatus-ant-1.2.31-2.1.ep5.el6.noarch.rpm tomcat5-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-admin-webapps-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-common-lib-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jasper-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jasper-eclipse-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jasper-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jsp-2.0-api-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-jsp-2.0-api-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-parent-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-server-lib-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-servlet-2.4-api-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-servlet-2.4-api-javadoc-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat5-webapps-5.5.33-15_patch_04.ep5.el6.noarch.rpm tomcat6-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-admin-webapps-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-docs-webapp-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-el-1.0-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-javadoc-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-jsp-2.1-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-lib-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-log4j-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-servlet-2.5-api-6.0.32-14_patch_03.ep5.el6.noarch.rpm tomcat6-webapps-6.0.32-14_patch_03.ep5.el6.noarch.rpm xalan-j2-2.7.1-5.3_patch_04.ep5.el6.noarch.rpm xerces-j2-2.9.1-8.patch01.1.ep5.el6.noarch.rpm xml-commons-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-jaxp-1.1-apis-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-jaxp-1.2-apis-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-jaxp-1.3-apis-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-resolver10-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-resolver11-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-resolver12-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-which10-1.3.04-7.14.ep5.el6.noarch.rpm xml-commons-which11-1.3.04-7.14.ep5.el6.noarch.rpm x86_64: httpd-2.2.17-11.2.ep5.el6.x86_64.rpm httpd-debuginfo-2.2.17-11.2.ep5.el6.x86_64.rpm httpd-devel-2.2.17-11.2.ep5.el6.x86_64.rpm httpd-manual-2.2.17-11.2.ep5.el6.x86_64.rpm httpd-tools-2.2.17-11.2.ep5.el6.x86_64.rpm jakarta-commons-daemon-jsvc-1.0.5-1.4.ep5.el6.x86_64.rpm jakarta-commons-daemon-jsvc-debuginfo-1.0.5-1.4.ep5.el6.x86_64.rpm mod_cluster-native-1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64.rpm mod_cluster-native-debuginfo-1.0.10-2.1.1.GA_CP01.ep5.el6.x86_64.rpm mod_jk-ap20-1.2.31-1.1.2.ep5.el6.x86_64.rpm mod_jk-debuginfo-1.2.31-1.1.2.ep5.el6.x86_64.rpm mod_jk-manual-1.2.31-1.1.2.ep5.el6.x86_64.rpm mod_ssl-2.2.17-11.2.ep5.el6.x86_64.rpm tomcat-native-1.1.20-2.1.2.ep5.el6.x86_64.rpm tomcat-native-debuginfo-1.1.20-2.1.2.ep5.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-1157.html https://www.redhat.com/security/data/cve/CVE-2010-1452.html https://www.redhat.com/security/data/cve/CVE-2010-1623.html https://www.redhat.com/security/data/cve/CVE-2010-3718.html https://www.redhat.com/security/data/cve/CVE-2010-4172.html https://www.redhat.com/security/data/cve/CVE-2011-0013.html https://www.redhat.com/security/data/cve/CVE-2011-0419.html https://access.redhat.com/security/updates/classification/#moderate http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOAubvXlSAg2UNWIIRApW6AJ4kvQ3q2boy3UntDB/XSHBuOmN02QCgmLaj NXAWrqe0nO3HRh9R1bnYZR0= =YW2z -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . HP OpenView Network Node Manager (OV NNM) v7.53 running on HP-UX, Linux, and Solaris. Apache-2.2.21.tar.gz is available using ftp. Host Account Password ftp.usa.hp.com sb02704 Secure12 After downloading Apache-2.2.21.tar.gz optionally verify the SHA1 check sum: SHA1(Apache-2.2.21.tar)= 642721cac9a7c4d1e8e6033a5198071bbdd54840 SHA1(Apache-2.2.21.tar.gz)= 87d0c04be6dd06b52f1b9c7c645ce39fad117a08 The Apache-2.2.21.tar archive contains a README.txt file with installation instructions

Trust: 2.52

sources: NVD: CVE-2011-0419 // JVNDB: JVNDB-2011-001638 // VULHUB: VHN-48364 // VULMON: CVE-2011-0419 // PACKETSTORM: 101599 // PACKETSTORM: 104936 // PACKETSTORM: 105422 // PACKETSTORM: 101667 // PACKETSTORM: 101435 // PACKETSTORM: 106416 // PACKETSTORM: 102549 // PACKETSTORM: 106557

AFFECTED PRODUCTS

vendor:netbsdmodel:netbsdscope:eqversion:5.1

Trust: 1.8

vendor:openbsdmodel:openbsdscope:eqversion:4.8

Trust: 1.8

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 1.8

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.2.0

Trust: 1.0

vendor:freebsdmodel:freebsdscope:eqversion:*

Trust: 1.0

vendor:googlemodel:androidscope:eqversion:*

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.6.0

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.0.0

Trust: 1.0

vendor:apachemodel:http serverscope:lteversion:2.0.65

Trust: 1.0

vendor:apachemodel:http serverscope:lteversion:2.2.18

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:apachemodel:portable runtimescope:ltversion:1.4.3

Trust: 1.0

vendor:apachemodel:http serverscope:ltversion:2.2.18

Trust: 0.8

vendor:apachemodel:portable runtimescope:ltversion:1.4.4

Trust: 0.8

vendor:freebsdmodel:freebsdscope: - version: -

Trust: 0.8

vendor:googlemodel:androidscope: - version: -

Trust: 0.8

vendor:ibmmodel:http serverscope:ltversion:6.1.0.39

Trust: 0.8

vendor:ibmmodel:http serverscope:ltversion:7.0.0.19

Trust: 0.8

vendor:ibmmodel:http serverscope:ltversion:8.0.0.1

Trust: 0.8

vendor:applemodel:mac os xscope: - version: -

Trust: 0.8

vendor:oraclemodel:http serverscope: - version: -

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:9

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:2.0 ( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux clientscope:eqversion:2008

Trust: 0.8

vendor:turbo linuxmodel:turbolinux fujiscope:eqversion:( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 ( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 (x64) ( extended maintenance )

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11 (x64)

Trust: 0.8

vendor:hewlett packardmodel:hp secure web server for openvmsscope:lteversion:v2.2

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.31

Trust: 0.8

vendor:hewlett packardmodel:hp-ux web server suitescope:eqversion:v3.18

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux eusscope:eqversion:5.6.z (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux long lifescope:eqversion:(v. 5.6 server)

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux server eusscope:eqversion:6.0.z

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:hitachimodel:cosminexus http serverscope: - version: -

Trust: 0.8

vendor:hitachimodel:web serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage application serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage studioscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage web serverscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2011-001638 // NVD: CVE-2011-0419

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0419
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-0419
value: MEDIUM

Trust: 0.8

VULHUB: VHN-48364
value: MEDIUM

Trust: 0.1

VULMON: CVE-2011-0419
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-0419
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-48364
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-48364 // VULMON: CVE-2011-0419 // JVNDB: JVNDB-2011-001638 // NVD: CVE-2011-0419

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.0

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-48364 // JVNDB: JVNDB-2011-001638 // NVD: CVE-2011-0419

THREAT TYPE

remote

Trust: 0.2

sources: PACKETSTORM: 101667 // PACKETSTORM: 101435

TYPE

xss

Trust: 0.1

sources: PACKETSTORM: 102549

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001638

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-48364 // VULMON: CVE-2011-0419

PATCH

title:Top Pageurl:http://www.android.com/

Trust: 0.8

title:Fixed in Apache httpd 2.2.18url:http://httpd.apache.org/security/vulnerabilities_22.html#2.2.18-dev

Trust: 0.8

title:Apache Portable Runtime 1.4.4 and Apache Portable Runtime Utility 1.3.11 Releasedurl:http://www.apache.org/dist/apr/Announcement1.x.html

Trust: 0.8

title:Apache HTTP Server 2.2.18 Releasedurl:http://www.apache.org/dist/httpd/Announcement2.2.html

Trust: 0.8

title:CHANGES-APR-1.4url:http://www.apache.org/dist/apr/CHANGES-APR-1.4

Trust: 0.8

title:1098188url:http://svn.apache.org/viewvc?view=revision&revision=1098188

Trust: 0.8

title:apr-1.2.7-11.AXS3.4url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1431

Trust: 0.8

title:Top Pageurl:http://security.freebsd.org

Trust: 0.8

title:HS11-011url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-011/index.html

Trust: 0.8

title:HPSBUX02702url:http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02997184

Trust: 0.8

title:HPSBOV02822 SSRT100966url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03517954

Trust: 0.8

title:7008517url:http://www-01.ibm.com/support/docview.wss?uid=swg27008517#61039

Trust: 0.8

title:7021867url:http://www-01.ibm.com/support/docview.wss?uid=swg27021867#8001

Trust: 0.8

title:PM38826url:http://www-01.ibm.com/support/docview.wss?uid=swg1PM38826

Trust: 0.8

title:7022958url:http://www-01.ibm.com/support/docview.wss?uid=swg27022958#8001

Trust: 0.8

title:2216url:https://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2216

Trust: 0.8

title:2218url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2218

Trust: 0.8

title:Announcing NetBSD 5.1url:http://www.netbsd.org/releases/formal-5/NetBSD-5.1.html

Trust: 0.8

title:The OpenBSD/4.8 Releaseurl:http://openbsd.org/48.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - July 2013 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujuly2013verbose-1899830.html

Trust: 0.8

title:Oracle Critical Patch Update Advisory - July 2012url:http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - July 2012 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujul2012verbose-392736.html

Trust: 0.8

title:Oracle Critical Patch Update Advisory - July 2013url:http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html

Trust: 0.8

title:Top Pageurl:http://www.oracle.com/jp/index.html

Trust: 0.8

title:RHSA-2011:0507url:https://rhn.redhat.com/errata/RHSA-2011-0507.html

Trust: 0.8

title:July 2013 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/july_2013_critical_patch_update

Trust: 0.8

title:CVE-2011-0419 Denial of Service (DoS) vulnerability in Solaris C Libraryurl:https://blogs.oracle.com/sunsecurity/entry/cve_2011_0419_denial_of

Trust: 0.8

title:Multiple vulnerabilities in Apache HTTP Serverurl:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_apache_http

Trust: 0.8

title:July 2012 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/july_2012_critical_patch_update

Trust: 0.8

title:TLSA-2011-21url:http://www.turbolinux.co.jp/security/2011/TLSA-2011-21j.txt

Trust: 0.8

title:Mac OS サービスおよびサポートurl:http://www.apple.com/jp/support/osfamily

Trust: 0.8

title:HS11-011url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-011/index.html

Trust: 0.8

title:Interstage HTTP Server: 2件のセキュリティ脆弱性url:http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_as_201104.html

Trust: 0.8

title:Debian CVElist Bug Report Logs: libapr1: last security update introduces a infinite loop conditionurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=f4d5d44f8e80720bcf4acb93ce19fa79

Trust: 0.1

title:Debian Security Advisories: DSA-2237-1 apr -- denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=6ecdb84f8bdfa0d557f7dc7af6c4d378

Trust: 0.1

title:Ubuntu Security Notice: apache2, apr vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1134-1

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2011-0419

Trust: 0.1

title:Entity-Extraction-Using-Syntaxneturl:https://github.com/rameel12/Entity-Extraction-Using-Syntaxnet

Trust: 0.1

title:Entity-Extraction-Using-Syntaxneturl:https://github.com/rameel12/Entity-Extractor-Using-Syntaxnet

Trust: 0.1

title:Pentest-Cheetsheeturl:https://github.com/MrFrozenPepe/Pentest-Cheetsheet

Trust: 0.1

title:ReconScanurl:https://github.com/GiJ03/ReconScan

Trust: 0.1

title:ReconScanurl:https://github.com/RoliSoft/ReconScan

Trust: 0.1

title:testurl:https://github.com/issdp/test

Trust: 0.1

title:ReconScanurl:https://github.com/kira1111/ReconScan

Trust: 0.1

title: - url:https://github.com/SecureAxom/strike

Trust: 0.1

sources: VULMON: CVE-2011-0419 // JVNDB: JVNDB-2011-001638

EXTERNAL IDS

db:NVDid:CVE-2011-0419

Trust: 2.8

db:SECUNIAid:44564

Trust: 2.0

db:SECUNIAid:44490

Trust: 2.0

db:SECTRACKid:1025527

Trust: 2.0

db:SECUNIAid:44574

Trust: 1.2

db:SECUNIAid:48308

Trust: 1.2

db:SREASONid:8246

Trust: 1.2

db:BIDid:47820

Trust: 1.0

db:JVNDBid:JVNDB-2011-001638

Trust: 0.8

db:PACKETSTORMid:104936

Trust: 0.2

db:PACKETSTORMid:106557

Trust: 0.2

db:PACKETSTORMid:106416

Trust: 0.2

db:PACKETSTORMid:101435

Trust: 0.2

db:PACKETSTORMid:105422

Trust: 0.2

db:PACKETSTORMid:101599

Trust: 0.2

db:PACKETSTORMid:101667

Trust: 0.2

db:EXPLOIT-DBid:35738

Trust: 0.2

db:PACKETSTORMid:101408

Trust: 0.1

db:PACKETSTORMid:105356

Trust: 0.1

db:PACKETSTORMid:117251

Trust: 0.1

db:PACKETSTORMid:104969

Trust: 0.1

db:PACKETSTORMid:106415

Trust: 0.1

db:PACKETSTORMid:101611

Trust: 0.1

db:PACKETSTORMid:101383

Trust: 0.1

db:CNNVDid:CNNVD-201105-160

Trust: 0.1

db:VULHUBid:VHN-48364

Trust: 0.1

db:VULMONid:CVE-2011-0419

Trust: 0.1

db:PACKETSTORMid:102549

Trust: 0.1

sources: VULHUB: VHN-48364 // VULMON: CVE-2011-0419 // PACKETSTORM: 101599 // PACKETSTORM: 104936 // PACKETSTORM: 105422 // PACKETSTORM: 101667 // PACKETSTORM: 101435 // PACKETSTORM: 106416 // PACKETSTORM: 102549 // PACKETSTORM: 106557 // JVNDB: JVNDB-2011-001638 // NVD: CVE-2011-0419

REFERENCES

url:http://secunia.com/advisories/44490

Trust: 2.0

url:http://secunia.com/advisories/44564

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00003.html

Trust: 1.2

url:http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/fnmatch.c#rev1.22

Trust: 1.2

url:http://httpd.apache.org/security/vulnerabilities_22.html

Trust: 1.2

url:http://support.apple.com/kb/ht5002

Trust: 1.2

url:http://www.apache.org/dist/apr/announcement1.x.html

Trust: 1.2

url:http://www.apache.org/dist/apr/changes-apr-1.4

Trust: 1.2

url:http://www.apache.org/dist/httpd/announcement2.2.html

Trust: 1.2

url:http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fnmatch.c#rev1.15

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html

Trust: 1.2

url:https://bugzilla.redhat.com/show_bug.cgi?id=703390

Trust: 1.2

url:http://www.debian.org/security/2011/dsa-2237

Trust: 1.2

url:http://www.mandriva.com/security/advisories?name=mdvsa-2011:084

Trust: 1.2

url:http://www.mandriva.com/security/advisories?name=mdvsa-2013:150

Trust: 1.2

url:http://cxib.net/stuff/apache.fnmatch.phps

Trust: 1.2

url:http://cxib.net/stuff/apr_fnmatch.txts

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14638

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14804

Trust: 1.2

url:http://www.redhat.com/support/errata/rhsa-2011-0507.html

Trust: 1.2

url:http://www.redhat.com/support/errata/rhsa-2011-0896.html

Trust: 1.2

url:http://www.redhat.com/support/errata/rhsa-2011-0897.html

Trust: 1.2

url:http://securitytracker.com/id?1025527

Trust: 1.2

url:http://secunia.com/advisories/44574

Trust: 1.2

url:http://secunia.com/advisories/48308

Trust: 1.2

url:http://securityreason.com/securityalert/8246

Trust: 1.2

url:http://securityreason.com/achievement_securityalert/98

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html

Trust: 1.2

url:http://svn.apache.org/viewvc?view=revision&revision=1098188

Trust: 1.1

url:http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029&r2=1098902

Trust: 1.1

url:http://svn.apache.org/viewvc?view=revision&revision=1098799

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=131551295528105&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=131731002122529&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=132033751509019&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=134987041210674&w=2

Trust: 1.1

url:http://www.mail-archive.com/dev%40apr.apache.org/msg23976.html

Trust: 1.0

url:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://www.mail-archive.com/dev%40apr.apache.org/msg23961.html

Trust: 1.0

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://www.mail-archive.com/dev%40apr.apache.org/msg23960.html

Trust: 1.0

url:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://www.securityfocus.com/bid/47820

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2011-0419

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0419

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0419

Trust: 0.8

url:http://www.securitytracker.com/id?1025527

Trust: 0.8

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.4

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.4

url:https://www.hp.com/go/swa

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-3192

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-3348

Trust: 0.3

url:http://www.mail-archive.com/dev@apr.apache.org/msg23961.html

Trust: 0.2

url:http://www.mail-archive.com/dev@apr.apache.org/msg23960.html

Trust: 0.2

url:http://www.mail-archive.com/dev@apr.apache.org/msg23976.html

Trust: 0.2

url:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs.httpd.apache.org%3e

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-1928

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029&amp;r2=1098902

Trust: 0.1

url:http://svn.apache.org/viewvc?view=revision&amp;revision=1098188

Trust: 0.1

url:http://svn.apache.org/viewvc?view=revision&amp;revision=1098799

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=132033751509019&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=134987041210674&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=131551295528105&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=131731002122529&amp;w=2

Trust: 0.1

url:https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3ccvs.httpd.apache.org%3e

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/770.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2011-0419

Trust: 0.1

url:https://github.com/rameel12/entity-extraction-using-syntaxnet

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/35738/

Trust: 0.1

url:https://usn.ubuntu.com/1134-1/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=23228

Trust: 0.1

url:http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110826103531.998348f82@minotaur.apache.org%3e

Trust: 0.1

url:https://ftp.usa.hp.com/hprc/home

Trust: 0.1

url:https://ftp.usa.hp.com/hprc

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apr/1.4.2-7ubuntu2.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apache2/2.0.55-4ubuntu2.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apr/1.3.8-1ubuntu0.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apr/1.4.2-3ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apr/1.2.11-1ubuntu0.2

Trust: 0.1

url:https://h20392.www2.hp.com/portal/swdepot/try.do?productnumber=hpuxwsatw319

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1623

Trust: 0.1

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3718.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1452

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-1623.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-1157.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-0013.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4172.html

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-0419.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4172

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-0897.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-1452.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1157

Trust: 0.1

url:http://bugzilla.redhat.com/):

Trust: 0.1

url:http://docs.redhat.com/docs/en-us/jboss_enterprise_web_server/1.0/html-single/release_notes_1.0.2/index.html

Trust: 0.1

sources: VULHUB: VHN-48364 // VULMON: CVE-2011-0419 // PACKETSTORM: 101599 // PACKETSTORM: 104936 // PACKETSTORM: 105422 // PACKETSTORM: 101667 // PACKETSTORM: 101435 // PACKETSTORM: 106416 // PACKETSTORM: 102549 // PACKETSTORM: 106557 // JVNDB: JVNDB-2011-001638 // NVD: CVE-2011-0419

CREDITS

HP

Trust: 0.4

sources: PACKETSTORM: 104936 // PACKETSTORM: 105422 // PACKETSTORM: 106416 // PACKETSTORM: 106557

SOURCES

db:VULHUBid:VHN-48364
db:VULMONid:CVE-2011-0419
db:PACKETSTORMid:101599
db:PACKETSTORMid:104936
db:PACKETSTORMid:105422
db:PACKETSTORMid:101667
db:PACKETSTORMid:101435
db:PACKETSTORMid:106416
db:PACKETSTORMid:102549
db:PACKETSTORMid:106557
db:JVNDBid:JVNDB-2011-001638
db:NVDid:CVE-2011-0419

LAST UPDATE DATE

2025-08-15T03:13:33.123000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-48364date:2018-01-06T00:00:00
db:VULMONid:CVE-2011-0419date:2022-09-19T00:00:00
db:JVNDBid:JVNDB-2011-001638date:2015-04-22T00:00:00
db:NVDid:CVE-2011-0419date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-48364date:2011-05-16T00:00:00
db:VULMONid:CVE-2011-0419date:2011-05-16T00:00:00
db:PACKETSTORMid:101599date:2011-05-21T14:45:49
db:PACKETSTORMid:104936date:2011-09-09T05:23:01
db:PACKETSTORMid:105422date:2011-09-29T18:05:00
db:PACKETSTORMid:101667date:2011-05-25T05:53:12
db:PACKETSTORMid:101435date:2011-05-15T20:49:35
db:PACKETSTORMid:106416date:2011-10-29T12:14:00
db:PACKETSTORMid:102549date:2011-06-24T09:10:50
db:PACKETSTORMid:106557date:2011-11-03T22:08:17
db:JVNDBid:JVNDB-2011-001638date:2011-05-27T00:00:00
db:NVDid:CVE-2011-0419date:2011-05-16T17:55:02.387