ID

VAR-201108-0132


CVE

CVE-2011-3192


TITLE

Apache HTTPD 1.3/2.x Range header DoS vulnerability

Trust: 0.8

sources: CERT/CC: VU#405811

DESCRIPTION

The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086. Apache HTTPD server contains a denial-of-service vulnerability in the way multiple overlapping ranges are handled. Both the 'Range' header and the 'Range-Request' header are vulnerable. An attack tool, commonly known as 'Apache Killer', has been released in the wild. The attack tool causes a significant increase in CPU and memory usage on the server. Successful exploits will result in a denial-of-service condition. ---------------------------------------------------------------------- The Secunia CSI 5.0 Beta - now available for testing Find out more, take a free test drive, and share your opinion with us: http://secunia.com/blog/242 ---------------------------------------------------------------------- TITLE: Hitachi Web Server ByteRange Filter Denial of Service Vulnerability SECUNIA ADVISORY ID: SA45865 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45865/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45865 RELEASE DATE: 2011-09-05 DISCUSS ADVISORY: http://secunia.com/advisories/45865/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/45865/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=45865 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Hitachi has acknowledged a vulnerability in Hitachi Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service). SOLUTION: Apply a workaround (please see the vendor's advisory for details). ORIGINAL ADVISORY: Hitachi (Japanese): http://www.hitachi.co.jp/Prod/comp/soft1/security/info/./vuls/HS11-019/index.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker might obtain sensitive information, gain privileges, send requests to unintended servers behind proxies, bypass certain security restrictions, obtain the values of HTTPOnly cookies, or cause a Denial of Service in various ways. A local attacker could gain escalated privileges. Workaround ========== There is no known workaround at this time. Resolution ========== All Apache HTTP Server users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.22-r1" References ========== [ 1 ] CVE-2010-0408 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408 [ 2 ] CVE-2010-0434 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434 [ 3 ] CVE-2010-1452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452 [ 4 ] CVE-2010-2791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791 [ 5 ] CVE-2011-3192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192 [ 6 ] CVE-2011-3348 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348 [ 7 ] CVE-2011-3368 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368 [ 8 ] CVE-2011-3607 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607 [ 9 ] CVE-2011-4317 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317 [ 10 ] CVE-2012-0021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021 [ 11 ] CVE-2012-0031 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031 [ 12 ] CVE-2012-0053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053 [ 13 ] CVE-2012-0883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201206-25.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . This update fixes this bug. This issue only affects the Debian 5.0 oldstable/lenny distribution. The regression has been fixed in the following packages: For the oldstable distribution (lenny), this problem has been fixed in version 2.2.9-10+lenny11. For the stable distribution (squeeze), this problem has been fixed in version 2.2.16-6+squeeze3. For the testing distribution (wheezy), this problem will be fixed in version 2.2.20-1. For the unstable distribution (sid), this problem has been fixed in version 2.2.20-1. We recommend that you upgrade your apache2 packages. This update also contains updated apache2-mpm-itk packages which have been recompiled against the updated apache2 packages. The new version number for the oldstable distribution is 2.2.6-02-1+lenny6. In the stable distribution, apache2-mpm-itk has the same version number as apache2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Apache HTTPD Security ADVISORY ============================== UPDATE 2 Title: Range header DoS vulnerability Apache HTTPD 1.3/2.x CVE: CVE-2011-3192 Last Change: 20110826 1030Z Date: 20110824 1600Z Product: Apache HTTPD Web Server Versions: Apache 1.3 all versions, Apache 2 all versions Changes since last update ========================= In addition to the 'Range' header - the 'Range-Request' header is equally affected. Furthermore various vendor updates, improved regexes (speed and accommodating a different and new attack pattern). Active use of this tool has been observed. The default Apache HTTPD installation is vulnerable. This advisory will be updated when a long term fix is available. A full fix is expected in the next 24 hours. Background and the 2007 report ============================== There are two aspects to this vulnerability. One is new, is Apache specific; and resolved with this server side fix. The other issue is fundamentally a protocol design issue dating back to 2007: http://seclists.org/bugtraq/2007/Jan/83 The contemporary interpretation of the HTTP protocol (currently) requires a server to return multiple (overlapping) ranges; in the order requested. This means that one can request a very large range (e.g. from byte 0- to the end) 100's of times in a single request. Being able to do so is an issue for (probably all) webservers and currently subject of an IETF discussion to change the protocol: http://trac.tools.ietf.org/wg/httpbis/trac/ticket/311 This advisory details a problem with how Apache httpd and its so called internal 'bucket brigades' deal with serving such "valid" request. The problem is that currently such requests internally explode into 100's of large fetches, all of which are kept in memory in an inefficient way. This is being addressed in two ways. By making things more efficient. And by weeding out or simplifying requests deemed too unwieldy. Mitigation: =========== There are several immediate options to mitigate this issue until a full fix is available. Below examples handle both the 'Range' and the legacy 'Request-Range' with various levels of care. Note that 'Request-Range' is a legacy name dating back to Netscape Navigator 2-3 and MSIE 3. Depending on your user community - it is likely that you can use option '3' safely for this older 'Request-Range'. 1) Use SetEnvIf or mod_rewrite to detect a large number of ranges and then either ignore the Range: header or reject the request. # CVE-2011-3192 SetEnvIf Range (?:,.*?){5,5} bad-range=1 RequestHeader unset Range env=bad-range # We always drop Request-Range; as this is a legacy # dating back to MSIE3 and Netscape 2 and 3. RequestHeader unset Request-Range # optional logging. CustomLog logs/range-CVE-2011-3192.log common env=bad-range CustomLog logs/range-CVE-2011-3192.log common env=bad-req-range Above may not work for all configurations. In particular situations mod_cache and (language) modules may act before the 'unset' is executed upon during the 'fixup' phase. Option 2: (Pre 2.2 and 1.3) # Reject request when more than 5 ranges in the Range: header. # CVE-2011-3192 # RewriteEngine on RewriteCond %{HTTP:range} !(bytes=[^,]+(,[^,]+){0,4}$|^$) # RewriteCond %{HTTP:request-range} !(bytes=[^,]+(?:,[^,]+){0,4}$|^$) RewriteRule .* - [F] # We always drop Request-Range; as this is a legacy # dating back to MSIE3 and Netscape 2 and 3. RequestHeader unset Request-Range The number 5 is arbitrary. Several 10's should not be an issue and may be required for sites which for example serve PDFs to very high end eReaders or use things such complex http based video streaming. 2) Limit the size of the request field to a few hundred bytes. Note that while this keeps the offending Range header short - it may break other headers; such as sizeable cookies or security fields. LimitRequestFieldSize 200 Note that as the attack evolves in the field you are likely to have to further limit this and/or impose other LimitRequestFields limits. See: http://httpd.apache.org/docs/2.2/mod/core.html#limitrequestfieldsize 3) Use mod_headers to completely dis-allow the use of Range headers: RequestHeader unset Range Note that this may break certain clients - such as those used for e-Readers and progressive/http-streaming video. Furthermore to ignore the Netscape Navigator 2-3 and MSIE 3 specific legacy header - add: RequestHeader unset Request-Range Unlike the commonly used 'Range' header - dropping the 'Request-Range' is not likely to affect many clients. 4) Deploy a Range header count module as a temporary stopgap measure: http://people.apache.org/~dirkx/mod_rangecnt.c Precompiled binaries for some platforms are available at: http://people.apache.org/~dirkx/BINARIES.txt 5) Apply any of the current patches under discussion - such as: http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3cCAAPSnn2PO-d-C4nQt_TES2RRWiZr7urefhTKPWBC1b+K1Dqc7g@mail.gmail.com%3e http://svn.apache.org/viewvc?view=revision&sortby=date&revision=1161534 OS and Vendor specific information ================================== Red Hat: Option 1 cannot be used on Red Hat Enterprise Linux 4. https://bugzilla.redhat.com/show_bug.cgi?id=732928 NetWare: Pre compiled binaries available. mod_security: Has updated their rule set; see http://blog.spiderlabs.com/2011/08/mitigation-of-apache-range-header-dos-attack.html Actions: ======== Apache HTTPD users who are concerned about a DoS attack against their server should consider implementing any of the above mitigations immediately. When using a third party attack tool to verify vulnerability - note that most of the versions in the wild currently check for the presence of mod_deflate; and will (mis)report that your server is not vulnerable if this module is not present. This vulnerability is not dependent on presence or absence of that module. Planning: ========= This advisory will be updated when new information, a patch or a new release is available. A patch or new Apache release for Apache 2.0 and 2.2 is expected in the next 24 hours. Note that, while popular, Apache 1.3 is deprecated. - -- end of advisory - update 2 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (Darwin) iEYEARECAAYFAk5Xdu8ACgkQ/W+IxiHQpxvN8ACgwsUJ6oYMq3SyoPHCR7rqsbP6 DFkAoKhZcF87F96h40tQdM1SZsiVX9N5 =07sc -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . The fix for CVE-2011-3192 provided by the MDVSA-2011:130 advisory introduced regressions in the way httpd handled certain Range HTTP header values. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348 https://issues.apache.org/bugzilla/show_bug.cgi?id=51878 _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.1: efa3019014628e3c480750c1f2004a7c 2010.1/i586/apache-base-2.2.15-3.5mdv2010.2.i586.rpm 3087616095041b2a0ec35a4f07b0db39 2010.1/i586/apache-devel-2.2.15-3.5mdv2010.2.i586.rpm f64f79810c740c6ea48a62b6efaa2e57 2010.1/i586/apache-htcacheclean-2.2.15-3.5mdv2010.2.i586.rpm 54193e742de9f3c09033686110dbcf12 2010.1/i586/apache-mod_authn_dbd-2.2.15-3.5mdv2010.2.i586.rpm 5190c0b547fdabd83f11f2c0b3c4c59c 2010.1/i586/apache-mod_cache-2.2.15-3.5mdv2010.2.i586.rpm 797c23a6d7bd773b56f12ef80e598bd3 2010.1/i586/apache-mod_dav-2.2.15-3.5mdv2010.2.i586.rpm 2489ede1721764643b2942292de4e43a 2010.1/i586/apache-mod_dbd-2.2.15-3.5mdv2010.2.i586.rpm 32132cdd5a453e1d35b34ad86756469b 2010.1/i586/apache-mod_deflate-2.2.15-3.5mdv2010.2.i586.rpm bb94bf4569a6979b23bbf29e51172deb 2010.1/i586/apache-mod_disk_cache-2.2.15-3.5mdv2010.2.i586.rpm c0465fd2bf450d8229c92ebd7b96e796 2010.1/i586/apache-mod_file_cache-2.2.15-3.5mdv2010.2.i586.rpm 8fe0536c0567db805b18eee9b6fbae4c 2010.1/i586/apache-mod_ldap-2.2.15-3.5mdv2010.2.i586.rpm f9f7679d70d4c06573737e401c9efa56 2010.1/i586/apache-mod_mem_cache-2.2.15-3.5mdv2010.2.i586.rpm bb61c23cadc265c1182e4d08beaf6834 2010.1/i586/apache-mod_proxy-2.2.15-3.5mdv2010.2.i586.rpm 724885ee3820d7b0ae7c20a188fb8c54 2010.1/i586/apache-mod_proxy_ajp-2.2.15-3.5mdv2010.2.i586.rpm 2582960ff8ed44b516dba77a8ca3f79e 2010.1/i586/apache-mod_proxy_scgi-2.2.15-3.5mdv2010.2.i586.rpm 54829077b157f55baa47bcb05769c039 2010.1/i586/apache-mod_reqtimeout-2.2.15-3.5mdv2010.2.i586.rpm 2e977bb1f6a182a2c70912167265ce50 2010.1/i586/apache-mod_ssl-2.2.15-3.5mdv2010.2.i586.rpm a5bf2b114ee2d72336adce28811c3037 2010.1/i586/apache-modules-2.2.15-3.5mdv2010.2.i586.rpm 83b2206a476ef960dd2267e42b2121af 2010.1/i586/apache-mod_userdir-2.2.15-3.5mdv2010.2.i586.rpm e5c81b0d5dee76dfe644188c719208fd 2010.1/i586/apache-mpm-event-2.2.15-3.5mdv2010.2.i586.rpm 1f565927f0329db6a6dcbfc146862d7d 2010.1/i586/apache-mpm-itk-2.2.15-3.5mdv2010.2.i586.rpm 9fe74c5aa75109bd04e60278d3ce4f27 2010.1/i586/apache-mpm-peruser-2.2.15-3.5mdv2010.2.i586.rpm 3a253e811772ae2eeed3ed028bb05dec 2010.1/i586/apache-mpm-prefork-2.2.15-3.5mdv2010.2.i586.rpm ada4b77b392aa8a5b6c283d1d3394f19 2010.1/i586/apache-mpm-worker-2.2.15-3.5mdv2010.2.i586.rpm f777f009148573676e3bda6fa9d3472a 2010.1/i586/apache-source-2.2.15-3.5mdv2010.2.i586.rpm 30b49a94b9485639515c5323a58a87b2 2010.1/SRPMS/apache-2.2.15-3.5mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 904ac3e39e1544ac03201c638f272461 2010.1/x86_64/apache-base-2.2.15-3.5mdv2010.2.x86_64.rpm 48164409c194bc836764f105d332b9b2 2010.1/x86_64/apache-devel-2.2.15-3.5mdv2010.2.x86_64.rpm 7f9ba9d3b24e352fd9c6dbb770d1c0e2 2010.1/x86_64/apache-htcacheclean-2.2.15-3.5mdv2010.2.x86_64.rpm bfc5629f34ceec77cc9f63cbacedec8b 2010.1/x86_64/apache-mod_authn_dbd-2.2.15-3.5mdv2010.2.x86_64.rpm e4f47be08c6bf1e1e12f8f8263014238 2010.1/x86_64/apache-mod_cache-2.2.15-3.5mdv2010.2.x86_64.rpm 01f8ba996efc43df6e94cf3ba7b960ee 2010.1/x86_64/apache-mod_dav-2.2.15-3.5mdv2010.2.x86_64.rpm 07b4081d62a107a075f1b2e13a505496 2010.1/x86_64/apache-mod_dbd-2.2.15-3.5mdv2010.2.x86_64.rpm 42dc96e272815486f57db1fc5b5006c3 2010.1/x86_64/apache-mod_deflate-2.2.15-3.5mdv2010.2.x86_64.rpm 5ab4bcddcd345aee9938a53f8c66f652 2010.1/x86_64/apache-mod_disk_cache-2.2.15-3.5mdv2010.2.x86_64.rpm 8bc139a4c4ce0381292885d35e0dc9a8 2010.1/x86_64/apache-mod_file_cache-2.2.15-3.5mdv2010.2.x86_64.rpm d7add6101b8b2393c9e16bbe4570e474 2010.1/x86_64/apache-mod_ldap-2.2.15-3.5mdv2010.2.x86_64.rpm 4276d115ba3061e90c55b3614fc094e9 2010.1/x86_64/apache-mod_mem_cache-2.2.15-3.5mdv2010.2.x86_64.rpm f12d0cfb139cfe7b46b2a6d6d0dbea74 2010.1/x86_64/apache-mod_proxy-2.2.15-3.5mdv2010.2.x86_64.rpm 527aa8011d33407b6e7419f51b1ba1f4 2010.1/x86_64/apache-mod_proxy_ajp-2.2.15-3.5mdv2010.2.x86_64.rpm 4b4fbeb9ae7243582d7a6d0f702c2f22 2010.1/x86_64/apache-mod_proxy_scgi-2.2.15-3.5mdv2010.2.x86_64.rpm fc812b63a2078aa8ee8cd6bbee447589 2010.1/x86_64/apache-mod_reqtimeout-2.2.15-3.5mdv2010.2.x86_64.rpm 5b13aaae983d8d37ade193afe05f97d0 2010.1/x86_64/apache-mod_ssl-2.2.15-3.5mdv2010.2.x86_64.rpm c00c4fd9fd7bb6179f96e65567c6197d 2010.1/x86_64/apache-modules-2.2.15-3.5mdv2010.2.x86_64.rpm 0280efe603339cea73a9989d1e216d2e 2010.1/x86_64/apache-mod_userdir-2.2.15-3.5mdv2010.2.x86_64.rpm 53d1ba40692126ce9d98110e754bdece 2010.1/x86_64/apache-mpm-event-2.2.15-3.5mdv2010.2.x86_64.rpm 74caa9e8aee48eb0506d91acd2c8075e 2010.1/x86_64/apache-mpm-itk-2.2.15-3.5mdv2010.2.x86_64.rpm 73e3ada13fe3df988d00ae0a7c31a8e4 2010.1/x86_64/apache-mpm-peruser-2.2.15-3.5mdv2010.2.x86_64.rpm 81ab4347551eb3c860b01985e614e309 2010.1/x86_64/apache-mpm-prefork-2.2.15-3.5mdv2010.2.x86_64.rpm 16164f1d9cbaf6e4d80874ef53a8b6fa 2010.1/x86_64/apache-mpm-worker-2.2.15-3.5mdv2010.2.x86_64.rpm 990b96231afbdc851ff03ccbb0e1203d 2010.1/x86_64/apache-source-2.2.15-3.5mdv2010.2.x86_64.rpm 30b49a94b9485639515c5323a58a87b2 2010.1/SRPMS/apache-2.2.15-3.5mdv2010.2.src.rpm Mandriva Enterprise Server 5: 000a1b64448acad341d2bead5a7b2b40 mes5/i586/apache-base-2.2.9-12.14mdvmes5.2.i586.rpm 4c904a9851b0a6b54c936952e21d4f9a mes5/i586/apache-devel-2.2.9-12.14mdvmes5.2.i586.rpm f8772da8100473cdb73c580764a052ff mes5/i586/apache-htcacheclean-2.2.9-12.14mdvmes5.2.i586.rpm df5ff9f23abbf7bfdfe3290dd229fa3c mes5/i586/apache-mod_authn_dbd-2.2.9-12.14mdvmes5.2.i586.rpm 495e3856b6a6c6deed0879a74ff96e91 mes5/i586/apache-mod_cache-2.2.9-12.14mdvmes5.2.i586.rpm 19bf954e5808bb55904eb15e0da83eaa mes5/i586/apache-mod_dav-2.2.9-12.14mdvmes5.2.i586.rpm 69b7ed150f649056ca9ed5c8dbb69ab9 mes5/i586/apache-mod_dbd-2.2.9-12.14mdvmes5.2.i586.rpm e0ef096233b8ab089944bd97a636d984 mes5/i586/apache-mod_deflate-2.2.9-12.14mdvmes5.2.i586.rpm ba8efbb0753f0c4b9e0542714c0dc38d mes5/i586/apache-mod_disk_cache-2.2.9-12.14mdvmes5.2.i586.rpm 778ee556b1cccf580aafe55104718ced mes5/i586/apache-mod_file_cache-2.2.9-12.14mdvmes5.2.i586.rpm 7e779a0c3ab9bf94a0f07a37b5a1ad76 mes5/i586/apache-mod_ldap-2.2.9-12.14mdvmes5.2.i586.rpm f1a30b1609adfd75a1d1aa81145cc2b1 mes5/i586/apache-mod_mem_cache-2.2.9-12.14mdvmes5.2.i586.rpm fe9fcfd8ca9b7129de9535aee2917f3f mes5/i586/apache-mod_proxy-2.2.9-12.14mdvmes5.2.i586.rpm 95943de5218e180dcdc4088e5757f6db mes5/i586/apache-mod_proxy_ajp-2.2.9-12.14mdvmes5.2.i586.rpm 318c98c15a80c6f54b5eafcb0f35c3dd mes5/i586/apache-mod_ssl-2.2.9-12.14mdvmes5.2.i586.rpm a4d215acc80c76d8fa7296a1a9e71e66 mes5/i586/apache-modules-2.2.9-12.14mdvmes5.2.i586.rpm 6dd522fae06c5b507125966862f3baeb mes5/i586/apache-mod_userdir-2.2.9-12.14mdvmes5.2.i586.rpm f142012531d29a89eb26bdf94fed9e77 mes5/i586/apache-mpm-event-2.2.9-12.14mdvmes5.2.i586.rpm 12f441381a02a93615f570de2984296d mes5/i586/apache-mpm-itk-2.2.9-12.14mdvmes5.2.i586.rpm e6fe55d8db2ea5fb88ea1b39f76b0bdb mes5/i586/apache-mpm-peruser-2.2.9-12.14mdvmes5.2.i586.rpm 74ba90b3e16d7dc1bf44f28e83666086 mes5/i586/apache-mpm-prefork-2.2.9-12.14mdvmes5.2.i586.rpm 89059e7700f61272a5a1bed0a5aa9854 mes5/i586/apache-mpm-worker-2.2.9-12.14mdvmes5.2.i586.rpm dceffe55d15d99932e04cf2b1f8f12c3 mes5/i586/apache-source-2.2.9-12.14mdvmes5.2.i586.rpm 1803c43f9aaa75ba96abb9b82b3f9cfd mes5/SRPMS/apache-2.2.9-12.14mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 050aa909a942ddf054f913066552fbcc mes5/x86_64/apache-base-2.2.9-12.14mdvmes5.2.x86_64.rpm 2d9fa3f4003f8577fc372493a216ff4a mes5/x86_64/apache-devel-2.2.9-12.14mdvmes5.2.x86_64.rpm 68305995effc2bd9a1cc6c234da9ce88 mes5/x86_64/apache-htcacheclean-2.2.9-12.14mdvmes5.2.x86_64.rpm 895e327ff7b75ba1489904c7f50c9219 mes5/x86_64/apache-mod_authn_dbd-2.2.9-12.14mdvmes5.2.x86_64.rpm 92f1a4e37e02079b707844c119f396cf mes5/x86_64/apache-mod_cache-2.2.9-12.14mdvmes5.2.x86_64.rpm 61c1d304dd3fc85717d1fdc74c62402a mes5/x86_64/apache-mod_dav-2.2.9-12.14mdvmes5.2.x86_64.rpm b4f161ec2d9745ea40e6be83ec670ad4 mes5/x86_64/apache-mod_dbd-2.2.9-12.14mdvmes5.2.x86_64.rpm b3dd2d1cd1d3a4236c022254e7f5dae5 mes5/x86_64/apache-mod_deflate-2.2.9-12.14mdvmes5.2.x86_64.rpm 6992b43e842ff1a77132c1667204a1f1 mes5/x86_64/apache-mod_disk_cache-2.2.9-12.14mdvmes5.2.x86_64.rpm 68885f5adf906884bfede7be9b98c0de mes5/x86_64/apache-mod_file_cache-2.2.9-12.14mdvmes5.2.x86_64.rpm 38152f4ed136292e725f0cac2a836a23 mes5/x86_64/apache-mod_ldap-2.2.9-12.14mdvmes5.2.x86_64.rpm d4e4ab43908f41d33106e069e85e19f0 mes5/x86_64/apache-mod_mem_cache-2.2.9-12.14mdvmes5.2.x86_64.rpm 4c54f275dd6dc1f4ef56c0fa26f1f262 mes5/x86_64/apache-mod_proxy-2.2.9-12.14mdvmes5.2.x86_64.rpm ab35ab1aedb6b0fe30143af8ebb1c51b mes5/x86_64/apache-mod_proxy_ajp-2.2.9-12.14mdvmes5.2.x86_64.rpm 86d6ca8156a2ec224dd2c8f064bfa685 mes5/x86_64/apache-mod_ssl-2.2.9-12.14mdvmes5.2.x86_64.rpm f0771cbbcad7bbbbb230ba17b49a00ec mes5/x86_64/apache-modules-2.2.9-12.14mdvmes5.2.x86_64.rpm 9d6ed0960614673c4085a2d9a90876b9 mes5/x86_64/apache-mod_userdir-2.2.9-12.14mdvmes5.2.x86_64.rpm 2dfc496e8aea977d133823ccbb72f754 mes5/x86_64/apache-mpm-event-2.2.9-12.14mdvmes5.2.x86_64.rpm f1a306cc23d666161058585337e598e6 mes5/x86_64/apache-mpm-itk-2.2.9-12.14mdvmes5.2.x86_64.rpm ede25d1a607e03b8e65b3ecb46fd7b2b mes5/x86_64/apache-mpm-peruser-2.2.9-12.14mdvmes5.2.x86_64.rpm 67c5a299b3ed4c15341a54cbbc06a2bc mes5/x86_64/apache-mpm-prefork-2.2.9-12.14mdvmes5.2.x86_64.rpm abd16d61836ee16d267d3cf29c68bdbf mes5/x86_64/apache-mpm-worker-2.2.9-12.14mdvmes5.2.x86_64.rpm 07dcbb776ca1b4261aa945b9daed5c3c mes5/x86_64/apache-source-2.2.9-12.14mdvmes5.2.x86_64.rpm 1803c43f9aaa75ba96abb9b82b3f9cfd mes5/SRPMS/apache-2.2.9-12.14mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03011498 Version: 1 HPSBMU02704 SSRT100619 rev.1 - HP OpenView Network Node Manager (OV NNM) Running Apache, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2011-11-03 Last Updated: 2011-11-03 Potential Security Impact: Remote Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM) running Apache. The vulnerabilities could be exploited remotely to create a Denial of Service (DoS). References: CVE-2011-3348, CVE-2011-3192, CVE-2011-0419 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP OpenView Network Node Manager (OV NNM) v7.53 running on HP-UX, Linux, and Solaris. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2011-3348 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided Apache-2.2.21 to resolve the vulnerabilities. Apache-2.2.21.tar.gz is available using ftp. Host Account Password ftp.usa.hp.com sb02704 Secure12 After downloading Apache-2.2.21.tar.gz optionally verify the SHA1 check sum: SHA1(Apache-2.2.21.tar)= 642721cac9a7c4d1e8e6033a5198071bbdd54840 SHA1(Apache-2.2.21.tar.gz)= 87d0c04be6dd06b52f1b9c7c645ce39fad117a08 The Apache-2.2.21.tar archive contains a README.txt file with installation instructions. MANUAL ACTIONS: No PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS (for HP-UX) For HP-UX OV NNM 7.53 HP-UX B.11.31 HP-UX B.11.23 (IA) HP-UX B.11.23 (PA) HP-UX B.11.11 ============= OVNNMgr.OVNNM-RUN,fr=B.07.50.00 action: install Apache-2.2.21 END AFFECTED VERSIONS (for HP-UX) HISTORY Version:1 (rev.1) - 3 November 2011 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2011 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners

Trust: 2.79

sources: NVD: CVE-2011-3192 // CERT/CC: VU#405811 // BID: 49303 // VULMON: CVE-2011-3192 // PACKETSTORM: 104441 // PACKETSTORM: 104804 // PACKETSTORM: 111915 // PACKETSTORM: 114141 // PACKETSTORM: 104836 // PACKETSTORM: 104479 // PACKETSTORM: 111957 // PACKETSTORM: 106788 // PACKETSTORM: 106557

AFFECTED PRODUCTS

vendor:hitachimodel:web serverscope:eqversion:03-00-01

Trust: 2.4

vendor:hitachimodel:web serverscope:eqversion:03-00

Trust: 2.1

vendor:hitachimodel:web serverscope:eqversion:03-00-02

Trust: 1.5

vendor:hitachimodel:web serverscope:eqversion:03-10

Trust: 1.5

vendor:susemodel:linux enterprise software development kitscope:eqversion:10

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.2.0

Trust: 1.0

vendor:apachemodel:http serverscope:ltversion:2.0.65

Trust: 1.0

vendor:apachemodel:http serverscope:ltversion:2.2.20

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:11.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:8.04

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.3

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.0.35

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.10

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.4

Trust: 1.0

vendor:hitachimodel:web server linuxscope:eqversion:04-00

Trust: 0.9

vendor:hitachimodel:web serverscope:eqversion:03-00-05

Trust: 0.9

vendor:hitachimodel:web serverscope:eqversion:03-10-01

Trust: 0.9

vendor:apache http servermodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mandriva s amodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/cm2/snmp system observerscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-03

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:jp1/hicommand device managerscope:eqversion:5.9-08

Trust: 0.6

vendor:hitachimodel:jp1/hicommand device managerscope:eqversion:5.9-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-03

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-02

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-04

Trust: 0.6

vendor:hitachimodel:web server linuxscope:eqversion:03-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1.1-01

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.0-06

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.0-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-04

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:tuning manager software )scope:eqversion:6.0

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1.1-01

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00

Trust: 0.6

vendor:hitachimodel:web serverscope:eqversion:04-10-02

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.15

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.10

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.36

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.39

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.2

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.16

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.35

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.13

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.20

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:1.3.34

Trust: 0.6

vendor:kolabmodel:groupware serverscope:eqversion:2.3.1

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:8.0.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:management center for cisco security agentscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-50

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-04

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.6-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.58

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.54

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.42

Trust: 0.3

vendor:hitachimodel:replication manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.401

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0.1

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:11

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel asscope:eqversion:41.0

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.1.1

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhelscope:eqversion:61.0.2

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-50

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.0.1-02

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhelscope:eqversion:61.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.41

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.9

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.57

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.6

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.11

Trust: 0.3

vendor:hitachimodel:web server aixscope:eqversion:04-00

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.0-06(x64))

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(rhelscope:eqversion:7.0.1-01

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:4.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.49

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-06

Trust: 0.3

vendor:hitachimodel:web server 04-10scope: - version: -

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-2

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.61-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-10-02

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.50

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-10-01

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.0-68

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.1.7

Trust: 0.3

vendor:fujitsumodel:interstage service integrator standard edition 9.0.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.1

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.10

Trust: 0.3

vendor:apachemodel:software foundation apache -betascope:eqversion:2.0.34

Trust: 0.3

vendor:checkmodel:point software secureplatform r60 hfa 05scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris expressscope:eqversion:11

Trust: 0.3

vendor:fujitsumodel:systemwalker service quality coordinator enterprise editionscope:eqversion:13.5

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.2-77

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.4

Trust: 0.3

vendor:kolabmodel:groupware serverscope:neversion:2.3.4

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-10-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager (solaris(sparcscope:eqversion:05-90

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager standard editio 10.0.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solutionscope:eqversion:2.6

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:6.4.0-08

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:hitachimodel:job management partner 1/performance management web consolescope:eqversion:-0

Trust: 0.3

vendor:apachemodel:software foundation apache -devscope:eqversion:2.0.56

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager )scope:eqversion:05-90

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.1

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-03

Trust: 0.3

vendor:hitachimodel:web server solarisscope:eqversion:04-00-01

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.0-06

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.2.77

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view enterprise edition 13.3.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.17

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-04

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager standard editioscope:eqversion:10.0

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:checkmodel:point software secureplatform r65 hfa02scope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apache -betascope:eqversion:2.0.28

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.15

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2.27

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-04(x64))

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-01(x64)

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.3.1

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.1

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:network collectorscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.3

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-10

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.96

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.55

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.6-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-10-04

Trust: 0.3

vendor:fujitsumodel:interstage service integrator enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.5-00

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view standard edition 13.3.0ascope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.17

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.2-01

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.0

Trust: 0.3

vendor:fujitsumodel:interstage list manager enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.15-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device manager (solaris (sscope:eqversion:5.9.0-08

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solutionscope:eqversion:3.2

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-01

Trust: 0.3

vendor:sunmodel:secure global desktopscope:eqversion:4.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager enterprise editscope:eqversion:10.1

Trust: 0.3

vendor:hitachimodel:web server (hp-uxscope:eqversion:03-0011.0)

Trust: 0.3

vendor:hitachimodel:web server 2).(solascope:eqversion:04-00-01(*

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager enterprise editscope:eqversion:10.2

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:checkmodel:point software secureplatform ng fp1scope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp3scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.1.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-05

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.45

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-53-01

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:0

Trust: 0.3

vendor:checkmodel:point software endpoint securityscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:7.001

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.4

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel serverscope:eqversion:51.0.2

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:6.4.0-08

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.12

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-30

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device manager (solarisscope:eqversion:5.9-00(x64))

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:checkmodel:point software secureplatform r65.70scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager )scope:eqversion:05-10

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.13

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.68

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:7.0.164

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0.102

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-03

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view standard editionscope:eqversion:13.3

Trust: 0.3

vendor:ciscomodel:video surveillance operations manager softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-08

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-02

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.31

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solutionscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.2

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-08

Trust: 0.3

vendor:apachemodel:software foundation apache betascope:eqversion:2.0.28

Trust: 0.3

vendor:ciscomodel:network collectorscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-04

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.3.1

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.28

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-03(x64))

Trust: 0.3

vendor:checkmodel:point software secureplatform ng fp2scope: - version: -

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.35

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.0-00

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5665

Trust: 0.3

vendor:apachemodel:software foundation apache a9scope:eqversion:2.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:2.0.42

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.2

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-90

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0-103

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00-05

Trust: 0.3

vendor:ibmmodel:os/400 v6r1m0scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:11.1.1.4

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.0.95

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:0

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.8

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.5-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-10

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.32

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-07

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-53

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-90

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.15

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-06

Trust: 0.3

vendor:checkmodel:point software security gatewaysscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:ciscomodel:san-osscope:eqversion:3.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.0-95

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.31

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.41

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:eqversion:6.0.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.59

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel esscope:eqversion:41.0.2

Trust: 0.3

vendor:kolabmodel:groupware server -rc2scope:eqversion:2.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.2

Trust: 0.3

vendor:fujitsumodel:interstage software quality analyzerscope:eqversion:10.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-20

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition bscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.19

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:application stackscope:eqversion:v20

Trust: 0.3

vendor:hitachimodel:jp1/it service level management managerscope:eqversion:-09-50

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-20

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:7.0.163

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.4

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:3.2

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-51-01

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.50

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.5

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.402

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.6

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.7.2

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.0.1-02

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solutionscope:eqversion:2.5

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.4.0-03

Trust: 0.3

vendor:fujitsumodel:interstage application server standard editionscope:eqversion:5.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.7.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.51

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:11.1.1.3

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.17

Trust: 0.3

vendor:hitachimodel:web server 04-00.scope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.18

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:neversion:2.2.20

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.1-73

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-10-01

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-00(x64))

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-00-04

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel serverscope:eqversion:51.0

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:eqversion:6.4.0-08

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.35

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.27

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.4.0-08

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-50-02

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-01

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(rhelscope:eqversion:7.1.0-00

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.1

Trust: 0.3

vendor:apachemodel:software foundation apache 2.3.38-devscope: - version: -

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.3.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.6

Trust: 0.3

vendor:kolabmodel:groupware serverscope:neversion:2.3.3

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0.95

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50-02

Trust: 0.3

vendor:fujitsumodel:interstage application server web-j editionscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-30

Trust: 0.3

vendor:fujitsumodel:interstage service integrator standard editionscope:eqversion:9.0

Trust: 0.3

vendor:checkmodel:point software dlp-1scope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.39

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:10

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:sunmodel:secure global desktopscope:eqversion:4.3

Trust: 0.3

vendor:checkmodel:point software secureplatform r71.30scope: - version: -

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.13

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition bscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-11

Trust: 0.3

vendor:hitachimodel:jp1/cm2/snmp system observer )scope:eqversion:09-00

Trust: 0.3

vendor:hpmodel:system management homepage bscope:eqversion:3.0.2.77

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-00

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.1.0-00

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:application server 10g r2scope:eqversion:10.1.2.3.0

Trust: 0.3

vendor:kolabmodel:groupware server 2.2-rc1scope: - version: -

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-00-05

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5687

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:fujitsumodel:systemwalker service quality coordinator enterprise editionscope:eqversion:13.4

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.3

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:susemodel:linux enterprise server for vmware sp1scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-10

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.43

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.64

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:jp1/it service level management managerscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-90

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-01

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:5.5.06.00

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.401

Trust: 0.3

vendor:redmodel:hat enterprise linux server 6.0.zscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.46

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.25

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-00-03

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:5.5

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:2.33

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:systemwalker service catalog manager v14gscope:eqversion:14.1

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:10.1.3.5

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.3

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-10-09

Trust: 0.3

vendor:ciscomodel:wide area application services 4.1.1bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solution updatescope:eqversion:2.6

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-11-02

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.14

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-07

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solution (dec updatescope:eqversion:3.02007

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.4

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.1.91.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-20

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.1

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:8.0.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.23

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:7.0.1-01

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.2-01

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:ciscomodel:wireless control system for linuxscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:2.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.5

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.18

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.62-devscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:5.0.1

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-01(*2)

Trust: 0.3

vendor:kolabmodel:groupware server 2.2-rc3scope: - version: -

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(slesscope:eqversion:7.1.0-00

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-00-04

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device manager (solarisscope:eqversion:5.9-08(x64))

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device manager (solaris (sscope:eqversion:5.9.0-00

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.3

Trust: 0.3

vendor:redmodel:hat enterprise linux 5.3.llscope: - version: -

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.17

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.13

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-00

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel asscope:eqversion:41.0.2

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-00-02

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.9

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:04-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.15

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-02

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.0.0-00

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:redmodel:hat enterprise linux elsscope:eqversion:3

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-30

Trust: 0.3

vendor:hitachimodel:web server (hp-uxscope:eqversion:03-00-0111.0

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.60-devscope: - version: -

Trust: 0.3

vendor:novellmodel:netware sp6scope:eqversion:6.5

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.1.1

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:5.0.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-60-01

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.35

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:novellmodel:netware sp8scope:eqversion:6.5.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:5.0.1

Trust: 0.3

vendor:ciscomodel:mobility services enginescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-40

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system web operation assistantscope:eqversion:3-0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:2.2

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:hitachimodel:replication manager software (solaris(spscope:eqversion:7.1.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.8

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.39

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.0.1-02

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.2-01

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.60

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:systemwalker software configuration managerscope:eqversion:14.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-03(x64))

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:ciscomodel:cts telepresence systemsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.13

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:fujitsumodel:interstage service integrator enterprise edition 9.0.0ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-09-00-50

Trust: 0.3

vendor:checkmodel:point software secureplatform r75scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-09

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.1

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5632

Trust: 0.3

vendor:checkmodel:point software secureplatform ng fp2 editionscope:eqversion:2

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.0-00(x64))

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.1-01

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.37

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.56

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.3.1

Trust: 0.3

vendor:hitachimodel:web server custom editionscope:eqversion:-0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager standard editioscope:eqversion:10.1

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0.96

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager standard editioscope:eqversion:10.2

Trust: 0.3

vendor:fujitsumodel:interstage list manager standard editionscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:6.0.181.0

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.4

Trust: 0.3

vendor:apachemodel:software foundation apachescope:neversion:2.2.21

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:checkmodel:point software ipso6 r70.40scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:fujitsumodel:interstage software quality analyzer 10.0.0ascope: - version: -

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:sunmodel:secure global desktopscope:neversion:4.62

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-10-10

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-60-01

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-10-03

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5150

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.7-devscope: - version: -

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:checkmodel:point software ipso6 r75scope: - version: -

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.19

Trust: 0.3

vendor:hitachimodel:web server 04-00-03.scope: - version: -

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5675

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-03

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10

Trust: 0.3

vendor:oraclemodel:application server 10g r3scope:eqversion:10.1.3.5.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-40

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-02(x64))

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.44

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.3

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition ascope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:1.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-00

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5645

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-40

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.19

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.1

Trust: 0.3

vendor:novellmodel:netware sp7scope:eqversion:6.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-00

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:7.1.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2.0-12

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.3

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.9

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-00

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.27

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5655

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-60

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-00-060

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.13

Trust: 0.3

vendor:fujitsumodel:interstage job workload serverscope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning managerscope:eqversion:05-90

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.1

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system web operation assistantscope:eqversion:2-0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:secure backupscope:eqversion:10.3.0.3

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1

Trust: 0.3

vendor:apachemodel:software foundation apache -betascope:eqversion:2.0.32

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.11

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.38

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:eqversion:6.4.0-08

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.001

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.52

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.17

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.2

Trust: 0.3

vendor:checkmodel:point software secureplatform ngscope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.63

Trust: 0.3

vendor:checkmodel:point software ipso6 r71.30scope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.36

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.402

Trust: 0.3

vendor:checkmodel:point software secureplatform r70.40scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-50

Trust: 0.3

vendor:hitachimodel:web server linuxscope:eqversion:04-10-01

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-02

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.1.73

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.18

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.1-00

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.2

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-01

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0.4

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel esscope:eqversion:41.0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:fujitsumodel:cloud infrastructure management softwarescope:eqversion:1.2

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.3

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0.6

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:11.1.1.5

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.4.0-08

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp4scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.0.100.0

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-09-50-01

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.4.0-08

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j edition 6.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.2.62.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.1.0-00

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.6

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.3

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-03(x64)

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:web server aixscope:eqversion:03-00

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.1.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.16

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-50-03

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-03

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.19

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.2.0-00

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0.5

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.0

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(slesscope:eqversion:7.0.1-01

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.12

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:hpmodel:onboard administratorscope:neversion:3.55

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5135

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.2

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:7.0.0-00

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-60

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.53

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-10-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-05

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tuning manager software (solaris(spscope:eqversion:6.4.0-03

Trust: 0.3

vendor:hitachimodel:web server solarisscope:eqversion:03-00

Trust: 0.3

vendor:ciscomodel:video surveillance managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-50-09

Trust: 0.3

vendor:fujitsumodel:systemwalker runbook automation v14g 14.1.0ascope: - version: -

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-51

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:7.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:6.4.0-08

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00-01

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:7.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.7

Trust: 0.3

vendor:hitachimodel:job management partner 1/automatic job management system manscope:eqversion:3-0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:2.0.47

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0.3

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-10

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.1-01

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0.103

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.32

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.3.0

Trust: 0.3

vendor:hitachimodel:web server )scope:eqversion:04-00

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5638

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:10.1.2.3

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.4.0-08

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.0

Trust: 0.3

vendor:checkmodel:point software ipso6 r65.70scope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:checkmodel:point software secureplatform ngx r60 buildscope:eqversion:244

Trust: 0.3

vendor:fujitsumodel:interstage business application server enterprise editionscope:eqversion:8.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-07

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:6.4.0-08

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.48

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition ascope:eqversion:9.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:hitachimodel:jp1/cm2/snmp system observerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:9000

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-10-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device managerscope:eqversion:05.10

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.0.1-02

Trust: 0.3

vendor:ciscomodel:wireless control system for windowsscope:eqversion:0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.47

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-00(x64))

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/serverconductor/control managerscope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view enterprise editionscope:eqversion:13.3

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-10

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.2

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.33

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:eqversion:6.4.0-08

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.2

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.40

Trust: 0.3

vendor:ciscomodel:quadscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.2-00(x64))

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.43

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.21

Trust: 0.3

vendor:fujitsumodel:systemwalker it process master standard editionscope:eqversion:13.3.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-50-01

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.1-03

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.7

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.61

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-01

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.4

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.64-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:job management partner 1/automatic job management system webscope:eqversion:3-0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.6

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50-01

Trust: 0.3

sources: CERT/CC: VU#405811 // BID: 49303 // CNNVD: CNNVD-201108-440 // NVD: CVE-2011-3192

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3192
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#405811
value: 16.01

Trust: 0.8

CNNVD: CNNVD-201108-440
value: HIGH

Trust: 0.6

VULMON: CVE-2011-3192
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-3192
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

sources: CERT/CC: VU#405811 // VULMON: CVE-2011-3192 // CNNVD: CNNVD-201108-440 // NVD: CVE-2011-3192

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

sources: NVD: CVE-2011-3192

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 106788 // CNNVD: CNNVD-201108-440

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201108-440

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2011-3192

PATCH

title:httpd-2.4.3url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44247

Trust: 0.6

title:Ubuntu Security Notice: apache2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1199-1

Trust: 0.1

title:Cisco: Apache HTTPd Range Header Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20110830-apache

Trust: 0.1

title:Debian Security Advisories: DSA-2298-2 apache2 -- denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=7227b6751a2a5332a53278f1881d559f

Trust: 0.1

title:Amazon Linux AMI: ALAS-2011-001url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2011-001

Trust: 0.1

title:Red Hat: Moderate: httpd security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120542 - Security Advisory

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2011-3192

Trust: 0.1

title:MNCanyonurl:https://github.com/MNCanyon/MNCanyon

Trust: 0.1

title:haproxy-ddosurl:https://github.com/analytically/haproxy-ddos

Trust: 0.1

title:DDoS-Scripturl:https://github.com/Encapsulate/DDoS-Script

Trust: 0.1

title:Mind_helpurl:https://github.com/MNCanyon/Mind_help

Trust: 0.1

title:DC-p0turl:https://github.com/5p1n6a11/DC-p0t

Trust: 0.1

sources: VULMON: CVE-2011-3192 // CNNVD: CNNVD-201108-440

EXTERNAL IDS

db:NVDid:CVE-2011-3192

Trust: 2.8

db:CERT/CCid:VU#405811

Trust: 2.4

db:BIDid:49303

Trust: 1.9

db:OSVDBid:74721

Trust: 1.6

db:SECUNIAid:45606

Trust: 1.6

db:SECUNIAid:46126

Trust: 1.6

db:SECUNIAid:46000

Trust: 1.6

db:SECUNIAid:45937

Trust: 1.6

db:SECUNIAid:46125

Trust: 1.6

db:SECTRACKid:1025960

Trust: 1.6

db:EXPLOIT-DBid:17696

Trust: 1.6

db:CNNVDid:CNNVD-201108-440

Trust: 0.6

db:HITACHIid:HS11-019

Trust: 0.4

db:HITACHIid:HS11-021

Trust: 0.3

db:HITACHIid:HS11-020

Trust: 0.3

db:HITACHIid:HS11-022

Trust: 0.3

db:JUNIPERid:JSA10642

Trust: 0.3

db:SECUNIAid:45865

Trust: 0.2

db:VULMONid:CVE-2011-3192

Trust: 0.1

db:PACKETSTORMid:104441

Trust: 0.1

db:PACKETSTORMid:104804

Trust: 0.1

db:PACKETSTORMid:111915

Trust: 0.1

db:PACKETSTORMid:114141

Trust: 0.1

db:PACKETSTORMid:104836

Trust: 0.1

db:PACKETSTORMid:104479

Trust: 0.1

db:PACKETSTORMid:111957

Trust: 0.1

db:PACKETSTORMid:106788

Trust: 0.1

db:PACKETSTORMid:106557

Trust: 0.1

sources: CERT/CC: VU#405811 // VULMON: CVE-2011-3192 // BID: 49303 // PACKETSTORM: 104441 // PACKETSTORM: 104804 // PACKETSTORM: 111915 // PACKETSTORM: 114141 // PACKETSTORM: 104836 // PACKETSTORM: 104479 // PACKETSTORM: 111957 // PACKETSTORM: 106788 // PACKETSTORM: 106557 // CNNVD: CNNVD-201108-440 // NVD: CVE-2011-3192

REFERENCES

url:http://www.apache.org/dist/httpd/announcement2.2.html

Trust: 2.1

url:http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html

Trust: 1.9

url:https://issues.apache.org/bugzilla/show_bug.cgi?id=51714

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html

Trust: 1.9

url:https://bugzilla.redhat.com/show_bug.cgi?id=732928

Trust: 1.8

url:http://seclists.org/fulldisclosure/2011/aug/175

Trust: 1.8

url:https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0

Trust: 1.6

url:http://www.gossamer-threads.com/lists/apache/dev/401638

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=131731002122529&w=2

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html

Trust: 1.6

url:http://secunia.com/advisories/45937

Trust: 1.6

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b90d73.shtml

Trust: 1.6

url:http://www.exploit-db.com/exploits/17696

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2011-1294.html

Trust: 1.6

url:http://support.apple.com/kb/ht5002

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdvsa-2011:130

Trust: 1.6

url:http://blogs.oracle.com/security/entry/security_alert_for_cve_2011

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=131551295528105&w=2

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00003.html

Trust: 1.6

url:http://www.kb.cert.org/vuls/id/405811

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14762

Trust: 1.6

url:http://secunia.com/advisories/46000

Trust: 1.6

url:http://secunia.com/advisories/46126

Trust: 1.6

url:http://secunia.com/advisories/46125

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2011-1245.html

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2011-1300.html

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/69396

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-1199-1

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=134987041210674&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=132033751509019&w=2

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2011-1330.html

Trust: 1.6

url:http://www.securityfocus.com/bid/49303

Trust: 1.6

url:http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html

Trust: 1.6

url:http://secunia.com/advisories/45606

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2011-1329.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=133477473521382&w=2

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2011-1369.html

Trust: 1.6

url:http://securitytracker.com/id?1025960

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdvsa-2013:150

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html

Trust: 1.6

url:http://osvdb.org/74721

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14824

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a18827

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=133951357207000&w=2

Trust: 1.6

url:http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122d387dd@minotaur.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3ccaapsnn2po-d-c4nqt_tes2rrwizr7urefhtkpwbc1b+k1dqc7g%40mail.gmail.com%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122d387dd%40minotaur.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://blog.spiderlabs.com/2011/08/mitigation-of-apache-range-header-dos-attack.html

Trust: 0.9

url:http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110826103531.998348f82@minotaur.apache.org%3e

Trust: 0.8

url:http://www.apache.org/dist/httpd/changes_2.2.20

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2011-3192

Trust: 0.8

url:httpd.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3ccvs.

Trust: 0.6

url:httpd/announcement2.2.html

Trust: 0.6

url:http://www.apache.org/dist/

Trust: 0.6

url:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs.

Trust: 0.6

url:httpd-dev/201108.mbox/%3ccaapsnn2po-d-c4nqt_tes2rrwizr7urefhtkpwbc1b+k1dqc7g@mail.gmail.com%3e

Trust: 0.6

url:http://mail-archives.apache.org/mod_mbox/

Trust: 0.6

url:httpd-announce/201108.mbox/%3c20110824161640.122d387dd@minotaur.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs.

Trust: 0.6

url:http://kolab.org/pipermail/kolab-announce/2011/000102.html

Trust: 0.3

url:http://kolab.org/pipermail/kolab-announce/2011/000103.html

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10642&cat=sirt_1&actp=list

Trust: 0.3

url:http://httpd.apache.org/download.cgi

Trust: 0.3

url:https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk65222

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/alerts-086861.html#securityalerts

Trust: 0.3

url:http://blogs.oracle.com/sunsecurity/entry/cve_2011_3192_and_cve

Trust: 0.3

url:http://blogs.oracle.com/sunsecurity/entry/cve_2011_3192_denial_of

Trust: 0.3

url:http://marc.info/?l=apache-httpd-dev&m=131418828705324&w=2

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/./vuls/hs11-020/index.html

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/./vuls/hs11-021/index.html

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/./vuls/hs11-022/index.html

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7009621

Trust: 0.3

url:/archive/1/520376

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100148618

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20110830-apache.shtml

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03285138

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03315912

Trust: 0.3

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03517954&ac.admitted=1349807398574.876444892.199480143

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-019/index.html

Trust: 0.3

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-201102e.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21512087

Trust: 0.3

url:http://httpd.apache.org/security/cve-2011-3192.txt

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2011-1300.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2011-1329.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2011-1330.html

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=nas2aae02620b9b78d9e862578fe003c799b

Trust: 0.3

url:http://www.xerox.com/download/security/security-bulletin/1284345-ee19-4bf3860908380/cert_xrx12-004_v1.01.pdf

Trust: 0.3

url:http://secunia.com/

Trust: 0.3

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-1452

Trust: 0.3

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.3

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3348

Trust: 0.3

url:http://people.apache.org/~dirkx/binaries.txt

Trust: 0.2

url:http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3ccaapsnn2po-d-c4nqt_tes2rrwizr7urefhtkpwbc1b+k1dqc7g@mail.gmail.com%3e

Trust: 0.2

url:http://people.apache.org/~dirkx/mod_rangecnt.c

Trust: 0.2

url:http://httpd.apache.org/docs/2.2/mod/core.html#limitrequestfieldsize

Trust: 0.2

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-0419

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2791

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/blog/242

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45865

Trust: 0.1

url:http://secunia.com/advisories/45865/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/./vuls/hs11-019/index.html

Trust: 0.1

url:http://secunia.com/advisories/45865/#comments

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1623

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4409

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1468

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3182

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1467

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1471

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0734

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2202

Trust: 0.1

url:http://h18000.www1.hp.com/products/servers/management/agents/index.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1945

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2068

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1938

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3436

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0014

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1464

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3189

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0434

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0031

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3368

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0031

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3368

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4317

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0053

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3348

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4317

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3607

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0021

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3607

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201206-25.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0434

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0053

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://seclists.org/bugtraq/2007/jan/83

Trust: 0.1

url:http://trac.tools.ietf.org/wg/httpbis/trac/ticket/311

Trust: 0.1

url:http://svn.apache.org/viewvc?view=revision&sortby=date&revision=1161534

Trust: 0.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/softwareindex.jsp?lang=en&cc=us&prodnameid=3188475&prodtypeid=329290&prodseriesid=3188465&swlang=8&taskid=135&swenvoid=1113

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3348

Trust: 0.1

url:https://issues.apache.org/bugzilla/show_bug.cgi?id=51878

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

sources: CERT/CC: VU#405811 // BID: 49303 // PACKETSTORM: 104441 // PACKETSTORM: 104804 // PACKETSTORM: 111915 // PACKETSTORM: 114141 // PACKETSTORM: 104836 // PACKETSTORM: 104479 // PACKETSTORM: 111957 // PACKETSTORM: 106788 // PACKETSTORM: 106557 // CNNVD: CNNVD-201108-440 // NVD: CVE-2011-3192

CREDITS

Kingcope

Trust: 0.3

sources: BID: 49303

SOURCES

db:CERT/CCid:VU#405811
db:VULMONid:CVE-2011-3192
db:BIDid:49303
db:PACKETSTORMid:104441
db:PACKETSTORMid:104804
db:PACKETSTORMid:111915
db:PACKETSTORMid:114141
db:PACKETSTORMid:104836
db:PACKETSTORMid:104479
db:PACKETSTORMid:111957
db:PACKETSTORMid:106788
db:PACKETSTORMid:106557
db:CNNVDid:CNNVD-201108-440
db:NVDid:CVE-2011-3192

LAST UPDATE DATE

2025-09-25T21:53:43.833000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#405811date:2011-09-19T00:00:00
db:VULMONid:CVE-2011-3192date:2022-09-19T00:00:00
db:BIDid:49303date:2015-05-07T17:20:00
db:CNNVDid:CNNVD-201108-440date:2022-09-20T00:00:00
db:NVDid:CVE-2011-3192date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#405811date:2011-08-26T00:00:00
db:VULMONid:CVE-2011-3192date:2011-08-29T00:00:00
db:BIDid:49303date:2011-08-24T00:00:00
db:PACKETSTORMid:104441date:2011-08-25T14:27:56
db:PACKETSTORMid:104804date:2011-09-06T04:48:58
db:PACKETSTORMid:111915date:2012-04-17T20:34:39
db:PACKETSTORMid:114141date:2012-06-24T23:54:52
db:PACKETSTORMid:104836date:2011-09-07T00:26:51
db:PACKETSTORMid:104479date:2011-08-26T14:40:28
db:PACKETSTORMid:111957date:2012-04-18T23:29:12
db:PACKETSTORMid:106788date:2011-11-09T16:26:04
db:PACKETSTORMid:106557date:2011-11-03T22:08:17
db:CNNVDid:CNNVD-201108-440date:2011-08-25T00:00:00
db:NVDid:CVE-2011-3192date:2011-08-29T15:55:02.017