ID

VAR-201108-0132


CVE

CVE-2011-3192


TITLE

Apache HTTPD 1.3/2.x Range header DoS vulnerability

Trust: 0.8

sources: CERT/CC: VU#405811

DESCRIPTION

The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086. Apache HTTPD server contains a denial-of-service vulnerability in the way multiple overlapping ranges are handled. Both the 'Range' header and the 'Range-Request' header are vulnerable. An attack tool, commonly known as 'Apache Killer', has been released in the wild. The attack tool causes a significant increase in CPU and memory usage on the server. Successful exploits will result in a denial-of-service condition. ========================================================================== Ubuntu Security Notice USN-1199-1 September 01, 2011 apache2 vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS Summary: A remote attacker could send crafted input to Apache and cause it to crash. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.04: apache2.2-bin 2.2.17-1ubuntu1.2 Ubuntu 10.10: apache2.2-bin 2.2.16-1ubuntu3.3 Ubuntu 10.04 LTS: apache2.2-bin 2.2.14-5ubuntu8.6 Ubuntu 8.04 LTS: apache2-mpm-event 2.2.8-1ubuntu0.21 apache2-mpm-perchild 2.2.8-1ubuntu0.21 apache2-mpm-prefork 2.2.8-1ubuntu0.21 apache2-mpm-worker 2.2.8-1ubuntu0.21 In general, a standard system update will make all the necessary changes. Multiple Cisco products may be affected by this vulnerability. Mitigations that can be deployed on Cisco devices within the network are available in the Cisco Applied Intelligence companion document for this Advisory: http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=24024 This advisory is posted at: http://www.cisco.com/warp/public/707/cisco-sa-20110830-apache.shtml Affected Products ================= Cisco is currently evaluating products for possible exposure to this vulnerability. Products will only be listed in the Vulnerable Products or Products Confirmed Not Vulnerable sections of this security advisory when a final determination about exposure is made. Products that are not listed in either of these two sections are still being evaluated. Vulnerable Products +------------------ This section will be updated when more information is available. The following products are confirmed to be affected by this vulnerability: * Cisco MDS 9000 NX-OS Software releases prior to 4.2.x are affected. Cisco MDS 9000 NX-OS Software releases 4.2.x and later are not affected. * Cisco NX-OS Software for Cisco Nexus 7000 Series Switches releases prior to 4.2.x are affected. Cisco NX-OS Software for Cisco Nexus 7000 Series Switches versions 4.2.x and later are not affected. * Cisco TelePresence Video Communication Server (Cisco TelePresence VCS) * Cisco Video Surveillance Manager (VSM) * Cisco Video Surveillance Operations Manager (VSOM) * Cisco Wireless Control System (WCS) Products Confirmed Not Vulnerable +-------------------------------- The following products are confirmed not vulnerable: * Cisco ASA 5500 Series Adaptive Security Appliances * Cisco Catalyst 6500 Series ASA Services Module * Cisco Catalyst 6500 Series Firewall Services Module * Cisco Fabric Manager * Cisco Identity Services Engine * Cisco Intercompany Media Engine * Cisco IOS Software * Cisco IOS XE Software * Cisco IOS XR Software * Cisco IP Interoperability and Collaboration System (IPICS) * Cisco Unified IP Phones * Cisco MDS 9000 NX-OS Software releases 4.2.x or later (prior versions are affected) * Cisco NX-OS Software for Nexus 7000 Series Switches releases 4.2.x or later (prior versions are affected) * Cisco Prime Central * Cisco Prime Optical * Cisco Prime Performance Manager * Cisco TelePresence Server * Cisco Unified Communications Manager (formerly Cisco CallManager) * Cisco Unity * Cisco Unity Connection * Cisco Wireless LAN Controllers (WLC) This section will be updated when more information is available. Multiple Cisco products may be affected by this vulnerability. The following Cisco bug IDs are being used to track potential exposure to this vulnerability. The following Cisco bug IDs do not confirm that a product is vulnerable; rather, the Cisco bug IDs indicate that the product is under investigation by the appropriate product teams. +--------------------------------------------------------------------------------------------+ | Cisco Product | Cisco bug ID | |----------------------------------------------------------------+---------------------------| | Cisco ACE 4710 Appliance | CSCts35635 | |----------------------------------------------------------------+---------------------------| | Cisco ACE Application Control Engine Module | CSCts35610 | |----------------------------------------------------------------+---------------------------| | Cisco ACE GSS 4400 Series Global Site Selector (GSS) | CSCts33313 | |----------------------------------------------------------------+---------------------------| | Cisco ACE XML Gateway | CSCts33321 | |----------------------------------------------------------------+---------------------------| | Cisco Active Network Abstraction | CSCts33317 | |----------------------------------------------------------------+---------------------------| | Cisco ASA 5500 Series Adaptive Security Appliances | CSCts33180 | |----------------------------------------------------------------+---------------------------| | Cisco CNS Network Registrar | CSCts36064 | |----------------------------------------------------------------+---------------------------| | Cisco Conductor for Videoscape | CSCts32986 | |----------------------------------------------------------------+---------------------------| | Cisco Content Delivery Engine | CSCts36206 | |----------------------------------------------------------------+---------------------------| | Cisco Content Delivery System Internet Streamer | CSCts35643 | |----------------------------------------------------------------+---------------------------| | Cisco Detector XT DDoS Mitigation Appliance | CSCts33211 | |----------------------------------------------------------------+---------------------------| | Cisco Guard XT DDoS Mitigation Appliance | CSCts33210 | |----------------------------------------------------------------+---------------------------| | Cisco Healthpresence | CSCts36069 | |----------------------------------------------------------------+---------------------------| | Cisco Identity Services Engine | CSCts33092 | |----------------------------------------------------------------+---------------------------| | Cisco IP Interoperability and Collaboration System | CSCts33206 | |----------------------------------------------------------------+---------------------------| | Cisco IP Phones | CSCts33264 | |----------------------------------------------------------------+---------------------------| | Cisco IPS Software | CSCts33199 | |----------------------------------------------------------------+---------------------------| | Cisco MDS 9000 SAN Device Management | CSCts33220 | |----------------------------------------------------------------+---------------------------| | Cisco MDS 9000 Series Multilayer Switches | CSCts33294 | |----------------------------------------------------------------+---------------------------| | Cisco NAC Manager | CSCts32965 | |----------------------------------------------------------------+---------------------------| | Cisco NAC Profiler | CSCts33267 | |----------------------------------------------------------------+---------------------------| | Cisco NAC Server | CSCts32976 | |----------------------------------------------------------------+---------------------------| | Cisco Network Analysis Module | CSCts33320 | |----------------------------------------------------------------+---------------------------| | Cisco Networking Services (CNS) Software | CSCts33279 | |----------------------------------------------------------------+---------------------------| | Cisco Nexus 5000 Series Switches | CSCts35605 | |----------------------------------------------------------------+---------------------------| | Cisco Nexus 7000 Series Switches | CSCts35665 | |----------------------------------------------------------------+---------------------------| | Cisco OnPlus Network Management and Automation | CSCts33287 | |----------------------------------------------------------------+---------------------------| | Cisco Prime Central | CSCts33004 | |----------------------------------------------------------------+---------------------------| | Cisco Prime Network Control System | CSCts33114 | |----------------------------------------------------------------+---------------------------| | Cisco Prime Performance Manager | CSCts36072 | |----------------------------------------------------------------+---------------------------| | Cisco Quad Collaboration | CSCts36158 | |----------------------------------------------------------------+---------------------------| | Cisco Secure Access Control System | CSCts33196 | |----------------------------------------------------------------+---------------------------| | Cisco Security Manager | CSCts33056 | |----------------------------------------------------------------+---------------------------| | Cisco Service Exchange Framework | CSCts33218 | |----------------------------------------------------------------+---------------------------| | Cisco Signaling Gateway Manager | CSCts33248 | |----------------------------------------------------------------+---------------------------| | Cisco Small Business Network Storage Systems | CSCts33288 | |----------------------------------------------------------------+---------------------------| | Cisco SSC System Manager | CSCts36187 | |----------------------------------------------------------------+---------------------------| | Cisco TelePresence Manager | CSCts33310 | |----------------------------------------------------------------+---------------------------| | Cisco TelePresence Multipoint Switch | CSCts33224 | |----------------------------------------------------------------+---------------------------| | Cisco TelePresence Server | CSCts33230 | |----------------------------------------------------------------+---------------------------| | Cisco CTS 500-32 Telepresence System Series | CSCts35874 | |----------------------------------------------------------------+---------------------------| | All Cisco CTS TelePresence Systems except Cisco CTS 500-32 | CSCts33276 | | TelePresence System Series | | |----------------------------------------------------------------+---------------------------| | Cisco Telepresence System Integrator C Series | CSCts35860 | |----------------------------------------------------------------+---------------------------| | Cisco UCS B-Series Blade Servers | CSCts33291 | |----------------------------------------------------------------+---------------------------| | Cisco Unified Communications Manager | CSCts32992 | |----------------------------------------------------------------+---------------------------| | Cisco Unified Communications System Voice and Unified | CSCts33271 | | Communications (VOSS) | | |----------------------------------------------------------------+---------------------------| | Cisco Unified MeetingPlace | CSCts33169 | |----------------------------------------------------------------+---------------------------| | Cisco Unified Operations Manager | CSCts33273 | |----------------------------------------------------------------+---------------------------| | Cisco Unified Presence Server | CSCts33257 | |----------------------------------------------------------------+---------------------------| | Cisco Unified Service Monitor | CSCts35893 | |----------------------------------------------------------------+---------------------------| | Cisco Unified Service Statistics Manager | CSCts36074 | |----------------------------------------------------------------+---------------------------| | Cisco Unity | CSCts33302 | |----------------------------------------------------------------+---------------------------| | Cisco Unity Connection | CSCts33260 | |----------------------------------------------------------------+---------------------------| | Cisco Video Surveillance Manager | CSCts33173 | |----------------------------------------------------------------+---------------------------| | Cisco Video Surveillance Operations Manager | CSCts33178 | |----------------------------------------------------------------+---------------------------| | Cisco Virtual Network Management | CSCts36207 | |----------------------------------------------------------------+---------------------------| | Cisco Voice Manager (CVM) | CSCts36152 | |----------------------------------------------------------------+---------------------------| | Cisco Wide Area Application Services (WAAS) Software | CSCts33254 | |----------------------------------------------------------------+---------------------------| | Cisco Wireless Control System (WCS) | CSCts33325 | |----------------------------------------------------------------+---------------------------| | Cisco Wireless Control System Navigator | CSCts33052 | |----------------------------------------------------------------+---------------------------| | Cisco Wireless LAN Controllers (WLC) | CSCts33327 | |----------------------------------------------------------------+---------------------------| | CiscoWorks Common Services | CSCts33049 | |----------------------------------------------------------------+---------------------------| | CiscoWorks LAN Management Solution (LMS) | CSCts35837 | |----------------------------------------------------------------+---------------------------| | Cisco Digital Media Suite Products | CSCts33189 | |----------------------------------------------------------------+---------------------------| | Management Center for Cisco Security Agents | CSCts33208 | |----------------------------------------------------------------+---------------------------| | Service Exchange Framework | CSCts36185 | |----------------------------------------------------------------+---------------------------| | Cisco Shared Network Management and Automation | CSCts33476 | +--------------------------------------------------------------------------------------------+ This vulnerability has been assigned the Common Vulnerabilities and Exposures (CVE) identifier CVE-2011-3192. Vulnerability Scoring Details +---------------------------- Cisco has provided scores for the vulnerability in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0. CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response. Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks. Cisco has provided an FAQ to answer additional questions regarding CVSS at http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at: http://intellishield.cisco.com/security/alertmanager/cvss * Apache HTTPd Range Header Denial of Service Vulnerability CVSS Base Score - 7.8 Access Vector - Network Access Complexity - Low Authentication - None Confidentiality Impact - None Integrity Impact - None Availability Impact - Complete CVSS Temporal Score - 7.8 Exploitability - High Remediation Level - Unavailable Report Confidence - Confirmed Impact ====== Successful exploitation of this vulnerability could cause significant memory and CPU utilization on affected products. Software Versions and Fixes =========================== When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution. In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance. Cisco NX-OS Software +------------------- Cisco MDS 9000 NX-OS Software releases prior to 4.2.x are affected. Cisco MDS 9000 NX-OS Software releases 4.2.x and later are not affected. Cisco NX-OS Software for Cisco Nexus 7000 Series Switches releases prior to 4.2.x are affected. Cisco NX-OS Software for Cisco Nexus 7000 Series Switches releases 4.2.x and later are not affected. Cisco Video Surveillance Manager (VSM) +------------------------------------- No fixed software is available. Cisco Video Surveillance Operations Manager (VSOM) +------------------------------------------------- No fixed software is available. This section will be updated when more information is available. Workarounds =========== Mitigations that can be deployed on Cisco devices within the network are available in the Cisco Applied Intelligence companion document for this Advisory: http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=24024 Obtaining Fixed Software ======================== Cisco has released free software updates that address this vulnerability. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment. Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html or as otherwise set forth at Cisco.com Downloads at: http://www.cisco.com/public/sw-center/sw-usingswc.shtml Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades. Customers with Service Contracts ================================ Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com Customers using Third Party Support Organizations ================================================= Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory. The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed. Customers without Service Contracts =================================== Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows. * +1 800 553 2447 (toll free from within North America) * +1 408 526 7209 (toll call from anywhere in the world) * e-mail: tac@cisco.com Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC. Refer to http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages. Exploitation and Public Announcements ===================================== This vulnerability was initially reported to the Full Disclosure mailing list at the following link: http://seclists.org/fulldisclosure/2011/Aug/175 Apache has confirmed that it is aware of exploitation of this vulnerability. Cisco is not aware of malicious exploitation of this vulnerability related specifically to Cisco products. Proof-of-concept code is available for this vulnerability. Status of this Notice: INTERIM ============================== THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE. A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. Distribution ============ This advisory is posted on Cisco's worldwide website at: http://www.cisco.com/warp/public/707/cisco-sa-20110830-apache.shtml In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients. * cust-security-announce@cisco.com * first-bulletins@lists.first.org * bugtraq@securityfocus.com * vulnwatch@vulnwatch.org * cisco@spot.colorado.edu * cisco-nsp@puck.nether.net * full-disclosure@lists.grok.org.uk * comp.dcom.sys.cisco@newsgate.cisco.com Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates. Revision History ================ +---------------------------------------+ | Revision | | Initial | | 1.0 | 2011-August-30 | public | | | | release. | +---------------------------------------+ Cisco Security Procedures ========================= Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at: http://www.cisco.com/go/psirt +-------------------------------------------------------------------- Copyright 2010-2011 Cisco Systems, Inc. All rights reserved. +-------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (SunOS) iFcDBQFOXE95QXnnBKKRMNARCNOOAPwNqw0GmcvgFiKgHiHKH/T2rH/tiaXmqEU5 zwHUOqyYegD8CZvVuM9OPIOb3f3AeMz5HxYDbPMxkg+SEURf05JtyBw= =lasc -----END PGP SIGNATURE----- . Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker might obtain sensitive information, gain privileges, send requests to unintended servers behind proxies, bypass certain security restrictions, obtain the values of HTTPOnly cookies, or cause a Denial of Service in various ways. A local attacker could gain escalated privileges. Workaround ========== There is no known workaround at this time. Resolution ========== All Apache HTTP Server users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.22-r1" References ========== [ 1 ] CVE-2010-0408 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408 [ 2 ] CVE-2010-0434 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434 [ 3 ] CVE-2010-1452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452 [ 4 ] CVE-2010-2791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791 [ 5 ] CVE-2011-3192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192 [ 6 ] CVE-2011-3348 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348 [ 7 ] CVE-2011-3368 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368 [ 8 ] CVE-2011-3607 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607 [ 9 ] CVE-2011-4317 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317 [ 10 ] CVE-2012-0021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021 [ 11 ] CVE-2012-0031 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031 [ 12 ] CVE-2012-0053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053 [ 13 ] CVE-2012-0883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201206-25.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . Release Date: 2011-09-26 Last Updated: 2011-09-26 ------------------------------------------------------------------------------ Potential Security Impact: Remote Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP-UX Apache Web Server. This vulnerability could be exploited remotely to create a Denial of Service (DoS). References: CVE-2011-0419, CVE-2011-3192, CVE-2011-3348 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, B.11.31 running HP-UX Apache Web Server Suite v3.18 containing Apache v2.2.15.08 or earlier BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2011-3348 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION This bulletin will be revised when additional information becomes available. The updates are available for download from the following location ftp://srt10626:Secure12@ftp.usa.hp.com/ or via HTTPS Access: https://ftp.usa.hp.com/hprc with username srt10626 and password Secure12 HP-UX Web Server Suite (WSS) v3.18 containing Apache v2.2.15.08.01 HP-UX 11i Releases / Apache Depot name B.11.23 B.11.31 (32-bit) / IA-PA-32.depot B.11.23 B.11.31 (64-bit) / IA-PA-64.depot NOTE: HP-UX Web Server Suite (WSS) v2.33 is not affected by this. MANUAL ACTIONS: Yes - Update Install HP-UX Web Server Suite v3.18 containing v2.2.15.08.01 or subsequent. PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. AFFECTED VERSIONS HP-UX Web Server Suite v3.18 HP-UX B.11.23 HP-UX B.11.31 ================== hpuxws22APCH32.APACHE hpuxws22APCH32.APACHE2 hpuxws22APCH32.AUTH_LDAP hpuxws22APCH32.AUTH_LDAP2 hpuxws22APCH32.MOD_JK hpuxws22APCH32.MOD_JK2 hpuxws22APCH32.MOD_PERL hpuxws22APCH32.MOD_PERL2 hpuxws22APCH32.PHP hpuxws22APCH32.PHP2 hpuxws22APCH32.WEBPROXY hpuxws22APCH32.WEBPROXY2 hpuxws22APACHE.APACHE hpuxws22APACHE.APACHE2 hpuxws22APACHE.AUTH_LDAP hpuxws22APACHE.AUTH_LDAP2 hpuxws22APACHE.MOD_JK hpuxws22APACHE.MOD_JK2 hpuxws22APACHE.MOD_PERL hpuxws22APACHE.MOD_PERL2 hpuxws22APACHE.PHP hpuxws22APACHE.PHP2 hpuxws22APACHE.WEBPROXY hpuxws22APACHE.WEBPROXY2 action: install revision B.2.2.15.08.01 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 26 September 2011 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2011 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, backup your existing JBoss Enterprise Web Server installation (including all applications and configuration files). Summary: Updated httpd packages that fix one security issue are now available for Red Hat Enterprise Linux 5.3 Long Life, 5.6 Extended Update Support, and 6.0 Extended Update Support. The Red Hat Security Response Team has rated this update as having important security impact. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux (v. 5.3.LL server) - i386, ia64, x86_64 Red Hat Enterprise Linux Server (v. 6.0.z) - i386, noarch, ppc64, s390x, x86_64 3. (CVE-2011-3192) All httpd users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 732928 - CVE-2011-3192 httpd: multiple ranges DoS 6. Package List: Red Hat Enterprise Linux (v. 5.3.LL server): Source: httpd-2.2.3-22.el5_3.3.src.rpm i386: httpd-2.2.3-22.el5_3.3.i386.rpm httpd-debuginfo-2.2.3-22.el5_3.3.i386.rpm httpd-devel-2.2.3-22.el5_3.3.i386.rpm httpd-manual-2.2.3-22.el5_3.3.i386.rpm mod_ssl-2.2.3-22.el5_3.3.i386.rpm ia64: httpd-2.2.3-22.el5_3.3.ia64.rpm httpd-debuginfo-2.2.3-22.el5_3.3.ia64.rpm httpd-devel-2.2.3-22.el5_3.3.ia64.rpm httpd-manual-2.2.3-22.el5_3.3.ia64.rpm mod_ssl-2.2.3-22.el5_3.3.ia64.rpm x86_64: httpd-2.2.3-22.el5_3.3.x86_64.rpm httpd-debuginfo-2.2.3-22.el5_3.3.i386.rpm httpd-debuginfo-2.2.3-22.el5_3.3.x86_64.rpm httpd-devel-2.2.3-22.el5_3.3.i386.rpm httpd-devel-2.2.3-22.el5_3.3.x86_64.rpm httpd-manual-2.2.3-22.el5_3.3.x86_64.rpm mod_ssl-2.2.3-22.el5_3.3.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: httpd-2.2.3-45.el5_6.2.src.rpm i386: httpd-2.2.3-45.el5_6.2.i386.rpm httpd-debuginfo-2.2.3-45.el5_6.2.i386.rpm httpd-devel-2.2.3-45.el5_6.2.i386.rpm httpd-manual-2.2.3-45.el5_6.2.i386.rpm mod_ssl-2.2.3-45.el5_6.2.i386.rpm ia64: httpd-2.2.3-45.el5_6.2.ia64.rpm httpd-debuginfo-2.2.3-45.el5_6.2.ia64.rpm httpd-devel-2.2.3-45.el5_6.2.ia64.rpm httpd-manual-2.2.3-45.el5_6.2.ia64.rpm mod_ssl-2.2.3-45.el5_6.2.ia64.rpm ppc: httpd-2.2.3-45.el5_6.2.ppc.rpm httpd-debuginfo-2.2.3-45.el5_6.2.ppc.rpm httpd-debuginfo-2.2.3-45.el5_6.2.ppc64.rpm httpd-devel-2.2.3-45.el5_6.2.ppc.rpm httpd-devel-2.2.3-45.el5_6.2.ppc64.rpm httpd-manual-2.2.3-45.el5_6.2.ppc.rpm mod_ssl-2.2.3-45.el5_6.2.ppc.rpm s390x: httpd-2.2.3-45.el5_6.2.s390x.rpm httpd-debuginfo-2.2.3-45.el5_6.2.s390.rpm httpd-debuginfo-2.2.3-45.el5_6.2.s390x.rpm httpd-devel-2.2.3-45.el5_6.2.s390.rpm httpd-devel-2.2.3-45.el5_6.2.s390x.rpm httpd-manual-2.2.3-45.el5_6.2.s390x.rpm mod_ssl-2.2.3-45.el5_6.2.s390x.rpm x86_64: httpd-2.2.3-45.el5_6.2.x86_64.rpm httpd-debuginfo-2.2.3-45.el5_6.2.i386.rpm httpd-debuginfo-2.2.3-45.el5_6.2.x86_64.rpm httpd-devel-2.2.3-45.el5_6.2.i386.rpm httpd-devel-2.2.3-45.el5_6.2.x86_64.rpm httpd-manual-2.2.3-45.el5_6.2.x86_64.rpm mod_ssl-2.2.3-45.el5_6.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6.0.z): Source: httpd-2.2.15-5.el6_0.1.src.rpm i386: httpd-2.2.15-5.el6_0.1.i686.rpm httpd-debuginfo-2.2.15-5.el6_0.1.i686.rpm httpd-devel-2.2.15-5.el6_0.1.i686.rpm httpd-tools-2.2.15-5.el6_0.1.i686.rpm mod_ssl-2.2.15-5.el6_0.1.i686.rpm noarch: httpd-manual-2.2.15-5.el6_0.1.noarch.rpm ppc64: httpd-2.2.15-5.el6_0.1.ppc64.rpm httpd-debuginfo-2.2.15-5.el6_0.1.ppc.rpm httpd-debuginfo-2.2.15-5.el6_0.1.ppc64.rpm httpd-devel-2.2.15-5.el6_0.1.ppc.rpm httpd-devel-2.2.15-5.el6_0.1.ppc64.rpm httpd-tools-2.2.15-5.el6_0.1.ppc64.rpm mod_ssl-2.2.15-5.el6_0.1.ppc64.rpm s390x: httpd-2.2.15-5.el6_0.1.s390x.rpm httpd-debuginfo-2.2.15-5.el6_0.1.s390.rpm httpd-debuginfo-2.2.15-5.el6_0.1.s390x.rpm httpd-devel-2.2.15-5.el6_0.1.s390.rpm httpd-devel-2.2.15-5.el6_0.1.s390x.rpm httpd-tools-2.2.15-5.el6_0.1.s390x.rpm mod_ssl-2.2.15-5.el6_0.1.s390x.rpm x86_64: httpd-2.2.15-5.el6_0.1.x86_64.rpm httpd-debuginfo-2.2.15-5.el6_0.1.i686.rpm httpd-debuginfo-2.2.15-5.el6_0.1.x86_64.rpm httpd-devel-2.2.15-5.el6_0.1.i686.rpm httpd-devel-2.2.15-5.el6_0.1.x86_64.rpm httpd-tools-2.2.15-5.el6_0.1.x86_64.rpm mod_ssl-2.2.15-5.el6_0.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-3192.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. Enjoy! * apache has been upgraded to the latest version (2.2.21) for 2011 _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192 _______________________________________________________________________ Updated Packages: Mandriva Linux 2011: 5c4825e4c63b4a06c68a5fd81517de71 2011/i586/apache-base-2.2.21-0.1-mdv2011.0.i586.rpm b5a00191b27804f9735643cdcd704b19 2011/i586/apache-conf-2.2.21-0.1-mdv2011.0.i586.rpm 49defd7efbb4a37ec49c01c7ef9c64aa 2011/i586/apache-devel-2.2.21-0.1-mdv2011.0.i586.rpm a023e40689777630df036eae1a84a475 2011/i586/apache-doc-2.2.21-0.1-mdv2011.0.noarch.rpm f03744bb74a3e0872cb08465799c3ee1 2011/i586/apache-htcacheclean-2.2.21-0.1-mdv2011.0.i586.rpm bb9efa66089deef66f9434b813d41a95 2011/i586/apache-mod_authn_dbd-2.2.21-0.1-mdv2011.0.i586.rpm bb334eb7fe43927ba7c6c9196b4e1fd1 2011/i586/apache-mod_cache-2.2.21-0.1-mdv2011.0.i586.rpm 086b5ed82c064b16964fff70bf9c841e 2011/i586/apache-mod_dav-2.2.21-0.1-mdv2011.0.i586.rpm 115008b2471e10ea01689dafe5c46bcd 2011/i586/apache-mod_dbd-2.2.21-0.1-mdv2011.0.i586.rpm 6b686ec6612ff8740d1e482faa06c544 2011/i586/apache-mod_deflate-2.2.21-0.1-mdv2011.0.i586.rpm 8c8f14074bc0dbbeb2b3890611f95c6b 2011/i586/apache-mod_disk_cache-2.2.21-0.1-mdv2011.0.i586.rpm b03569edc20c9393e0b5eea09f590368 2011/i586/apache-mod_file_cache-2.2.21-0.1-mdv2011.0.i586.rpm 343703d3822a6757e000edeebe7e0a06 2011/i586/apache-mod_ldap-2.2.21-0.1-mdv2011.0.i586.rpm 3457011403525d40e525716c4da8e477 2011/i586/apache-mod_mem_cache-2.2.21-0.1-mdv2011.0.i586.rpm 3d060145b3665ca4c0b309f812af9370 2011/i586/apache-mod_proxy-2.2.21-0.1-mdv2011.0.i586.rpm a0e00b0610eb5a8c5c57afabeafc07f8 2011/i586/apache-mod_proxy_ajp-2.2.21-0.1-mdv2011.0.i586.rpm dd4bb38bbc2997ca398fb37225eca371 2011/i586/apache-mod_proxy_scgi-2.2.21-0.1-mdv2011.0.i586.rpm 2966cdfddf02fa32447711af6a3046dd 2011/i586/apache-mod_reqtimeout-2.2.21-0.1-mdv2011.0.i586.rpm 48774d9c282dc476f35a0c8b2e821a7f 2011/i586/apache-mod_ssl-2.2.21-0.1-mdv2011.0.i586.rpm 7b832f85bd258abf0c7abb161f4028b4 2011/i586/apache-mod_suexec-2.2.21-0.1-mdv2011.0.i586.rpm 1c6b93eaa5b27477989bf82ea9a63685 2011/i586/apache-modules-2.2.21-0.1-mdv2011.0.i586.rpm 1e7dc0ee3fafae8a786be0cc164ebe4a 2011/i586/apache-mod_userdir-2.2.21-0.1-mdv2011.0.i586.rpm ab2d074f2dfe57a64b022d4e6b8254ab 2011/i586/apache-mpm-event-2.2.21-0.1-mdv2011.0.i586.rpm a22debf09366b64e236965a4091009e9 2011/i586/apache-mpm-itk-2.2.21-0.1-mdv2011.0.i586.rpm 174aed4327491b83f147f3b4e76bcd1f 2011/i586/apache-mpm-peruser-2.2.21-0.1-mdv2011.0.i586.rpm e141881c27496e7e74ad7f3f566a1bd2 2011/i586/apache-mpm-prefork-2.2.21-0.1-mdv2011.0.i586.rpm 97893069a3d6eb73e3773bc0ee78c9a4 2011/i586/apache-mpm-worker-2.2.21-0.1-mdv2011.0.i586.rpm fe530e2da15b3e0bf14c617824ff82c9 2011/i586/apache-source-2.2.21-0.1-mdv2011.0.i586.rpm 4376094cd799523a1a7666f4e768707d 2011/SRPMS/apache-2.2.21-0.1.src.rpm b37e2a1dafb6883a10cefb4140e9635e 2011/SRPMS/apache-conf-2.2.21-0.1.src.rpm d83c587ad4d56a31362f67334bbf9455 2011/SRPMS/apache-doc-2.2.21-0.1.src.rpm 0b4a145fd5ff8c11a53956f750cdbd42 2011/SRPMS/apache-mod_suexec-2.2.21-0.1.src.rpm Mandriva Linux 2011/X86_64: 8837c56966896e10d3403956e7cf86ac 2011/x86_64/apache-base-2.2.21-0.1-mdv2011.0.x86_64.rpm aec6da25319585e53623471734f99c57 2011/x86_64/apache-conf-2.2.21-0.1-mdv2011.0.x86_64.rpm e8600455214ad4f2303d9f36576e4952 2011/x86_64/apache-devel-2.2.21-0.1-mdv2011.0.x86_64.rpm 90694f3211fca3d436ec4130b8bb43e2 2011/x86_64/apache-doc-2.2.21-0.1-mdv2011.0.noarch.rpm fd3f6a51c8abf8b1ff8356489ba6d6e1 2011/x86_64/apache-htcacheclean-2.2.21-0.1-mdv2011.0.x86_64.rpm 796c8129bbc160455587bc54c58c2220 2011/x86_64/apache-mod_authn_dbd-2.2.21-0.1-mdv2011.0.x86_64.rpm 61add54b6e0c8306dff065a150b262e2 2011/x86_64/apache-mod_cache-2.2.21-0.1-mdv2011.0.x86_64.rpm cb98169c29008c256662f3a08141bf95 2011/x86_64/apache-mod_dav-2.2.21-0.1-mdv2011.0.x86_64.rpm 5aa03ee54a7e40d41fd746fd1a223c72 2011/x86_64/apache-mod_dbd-2.2.21-0.1-mdv2011.0.x86_64.rpm 386a956f014fe2d64dfe38fc261abd39 2011/x86_64/apache-mod_deflate-2.2.21-0.1-mdv2011.0.x86_64.rpm 5a473bc45fa59323c4d526dd4f5a30d3 2011/x86_64/apache-mod_disk_cache-2.2.21-0.1-mdv2011.0.x86_64.rpm aaa544f7a4912c161a2c73e222ae87d6 2011/x86_64/apache-mod_file_cache-2.2.21-0.1-mdv2011.0.x86_64.rpm f04054edc62a24ea9042c5b41074bd1d 2011/x86_64/apache-mod_ldap-2.2.21-0.1-mdv2011.0.x86_64.rpm 1c97f63c1169f483d086a94b97f5c421 2011/x86_64/apache-mod_mem_cache-2.2.21-0.1-mdv2011.0.x86_64.rpm ca912c34fec5cf470947a7f87e9705a4 2011/x86_64/apache-mod_proxy-2.2.21-0.1-mdv2011.0.x86_64.rpm b5ae70a8ed412e40275b4de7b639caa0 2011/x86_64/apache-mod_proxy_ajp-2.2.21-0.1-mdv2011.0.x86_64.rpm 6b11b032c13277712c336405ea23a8b0 2011/x86_64/apache-mod_proxy_scgi-2.2.21-0.1-mdv2011.0.x86_64.rpm 874a420342f1ea9278e014b79fe5a337 2011/x86_64/apache-mod_reqtimeout-2.2.21-0.1-mdv2011.0.x86_64.rpm 2757b3d7c8261563e22c41d3f94aaa29 2011/x86_64/apache-mod_ssl-2.2.21-0.1-mdv2011.0.x86_64.rpm 6edbc6963aab9beee507f9a3c8be38a2 2011/x86_64/apache-mod_suexec-2.2.21-0.1-mdv2011.0.x86_64.rpm fe6143eaa1acc0de751198ea19129279 2011/x86_64/apache-modules-2.2.21-0.1-mdv2011.0.x86_64.rpm 3e66fa1e1e2cf243c1c6472243cb86fe 2011/x86_64/apache-mod_userdir-2.2.21-0.1-mdv2011.0.x86_64.rpm 7d45bfd7d3aa87d45d2287fdd9507847 2011/x86_64/apache-mpm-event-2.2.21-0.1-mdv2011.0.x86_64.rpm bce9e2cdffe45cbc4baf72f0d0c4000e 2011/x86_64/apache-mpm-itk-2.2.21-0.1-mdv2011.0.x86_64.rpm 217bd96dfa802f7d049b6fd12600b154 2011/x86_64/apache-mpm-peruser-2.2.21-0.1-mdv2011.0.x86_64.rpm cc304b9011d16d7f3cf5c8250e4d9f18 2011/x86_64/apache-mpm-prefork-2.2.21-0.1-mdv2011.0.x86_64.rpm a8bb9b62c39f98a6df728d51a4fff39a 2011/x86_64/apache-mpm-worker-2.2.21-0.1-mdv2011.0.x86_64.rpm 7d41c857be2574ac5f3ea7090a1f3c78 2011/x86_64/apache-source-2.2.21-0.1-mdv2011.0.x86_64.rpm 4376094cd799523a1a7666f4e768707d 2011/SRPMS/apache-2.2.21-0.1.src.rpm b37e2a1dafb6883a10cefb4140e9635e 2011/SRPMS/apache-conf-2.2.21-0.1.src.rpm d83c587ad4d56a31362f67334bbf9455 2011/SRPMS/apache-doc-2.2.21-0.1.src.rpm 0b4a145fd5ff8c11a53956f750cdbd42 2011/SRPMS/apache-mod_suexec-2.2.21-0.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFOdErbmqjQ0CJFipgRArO0AJ9MeU1I/ItvY699awHPqXD7TZZ46gCeP/Lc OVJD0GobLzQ3q1XZS8WiqdY= =O8Ag -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: Hitachi Products ByteRange Filter Denial of Service Vulnerability SECUNIA ADVISORY ID: SA46229 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46229/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46229 RELEASE DATE: 2011-10-30 DISCUSS ADVISORY: http://secunia.com/advisories/46229/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46229/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46229 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Hitachi has acknowledged a vulnerability in multiple Hitachi products, which can be exploited by malicious people to cause a DoS (Denial of Service). SOLUTION: Apply fixes (please see the vendor's advisory for details). ORIGINAL ADVISORY: Hitachi (Japanese): http://www.hitachi.co.jp/Prod/comp/soft1/security/info/./vuls/HS11-020/index.html http://www.hitachi.co.jp/Prod/comp/soft1/security/info/./vuls/HS11-021/index.html http://www.hitachi.co.jp/Prod/comp/soft1/security/info/./vuls/HS11-022/index.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . HP OpenView Network Node Manager (OV NNM) v7.53 running on HP-UX, Linux, and Solaris. Apache-2.2.21.tar.gz is available using ftp. Host Account Password ftp.usa.hp.com sb02704 Secure12 After downloading Apache-2.2.21.tar.gz optionally verify the SHA1 check sum: SHA1(Apache-2.2.21.tar)= 642721cac9a7c4d1e8e6033a5198071bbdd54840 SHA1(Apache-2.2.21.tar.gz)= 87d0c04be6dd06b52f1b9c7c645ce39fad117a08 The Apache-2.2.21.tar archive contains a README.txt file with installation instructions

Trust: 3.06

sources: NVD: CVE-2011-3192 // CERT/CC: VU#405811 // BID: 49303 // VULMON: CVE-2011-3192 // PACKETSTORM: 104711 // PACKETSTORM: 104618 // PACKETSTORM: 114141 // PACKETSTORM: 104784 // PACKETSTORM: 105422 // PACKETSTORM: 105160 // PACKETSTORM: 105288 // PACKETSTORM: 105120 // PACKETSTORM: 105184 // PACKETSTORM: 111957 // PACKETSTORM: 106388 // PACKETSTORM: 106557

AFFECTED PRODUCTS

vendor:hitachimodel:web serverscope:eqversion:03-00-01

Trust: 2.4

vendor:hitachimodel:web serverscope:eqversion:03-00

Trust: 2.1

vendor:hitachimodel:web serverscope:eqversion:03-00-02

Trust: 1.5

vendor:hitachimodel:web serverscope:eqversion:03-10

Trust: 1.5

vendor:susemodel:linux enterprise software development kitscope:eqversion:10

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.2.0

Trust: 1.0

vendor:apachemodel:http serverscope:ltversion:2.0.65

Trust: 1.0

vendor:apachemodel:http serverscope:ltversion:2.2.20

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:11.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:8.04

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.3

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.0.35

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.10

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.4

Trust: 1.0

vendor:hitachimodel:web server linuxscope:eqversion:04-00

Trust: 0.9

vendor:hitachimodel:web serverscope:eqversion:03-00-05

Trust: 0.9

vendor:hitachimodel:web serverscope:eqversion:03-10-01

Trust: 0.9

vendor:apache http servermodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mandriva s amodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/cm2/snmp system observerscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-03

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:jp1/hicommand device managerscope:eqversion:5.9-08

Trust: 0.6

vendor:hitachimodel:jp1/hicommand device managerscope:eqversion:5.9-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-03

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-02

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-04

Trust: 0.6

vendor:hitachimodel:web server linuxscope:eqversion:03-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1.1-01

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.0-06

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.0-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-04

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:tuning manager software )scope:eqversion:6.0

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1.1-01

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00

Trust: 0.6

vendor:hitachimodel:web serverscope:eqversion:04-10-02

Trust: 0.6

vendor:kolabmodel:groupware serverscope:eqversion:2.3.1

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:8.0.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:management center for cisco security agentscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-50

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-04

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.6-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.58

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.54

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.42

Trust: 0.3

vendor:hitachimodel:replication manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.401

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0.1

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:11

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel asscope:eqversion:41.0

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.1.1

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhelscope:eqversion:61.0.2

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-50

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.0.1-02

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhelscope:eqversion:61.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.41

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.9

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.57

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.6

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.11

Trust: 0.3

vendor:hitachimodel:web server aixscope:eqversion:04-00

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.0-06(x64))

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(rhelscope:eqversion:7.0.1-01

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:4.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.49

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-06

Trust: 0.3

vendor:hitachimodel:web server 04-10scope: - version: -

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-2

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.61-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-10-02

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.50

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-10-01

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.0-68

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.1.7

Trust: 0.3

vendor:fujitsumodel:interstage service integrator standard edition 9.0.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.1

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.10

Trust: 0.3

vendor:apachemodel:software foundation apache -betascope:eqversion:2.0.34

Trust: 0.3

vendor:checkmodel:point software secureplatform r60 hfa 05scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris expressscope:eqversion:11

Trust: 0.3

vendor:fujitsumodel:systemwalker service quality coordinator enterprise editionscope:eqversion:13.5

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.2-77

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.4

Trust: 0.3

vendor:kolabmodel:groupware serverscope:neversion:2.3.4

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-10-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager (solaris(sparcscope:eqversion:05-90

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager standard editio 10.0.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solutionscope:eqversion:2.6

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:6.4.0-08

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:hitachimodel:job management partner 1/performance management web consolescope:eqversion:-0

Trust: 0.3

vendor:apachemodel:software foundation apache -devscope:eqversion:2.0.56

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager )scope:eqversion:05-90

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.1

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-03

Trust: 0.3

vendor:hitachimodel:web server solarisscope:eqversion:04-00-01

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.0-06

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.2.77

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view enterprise edition 13.3.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.17

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-04

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager standard editioscope:eqversion:10.0

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:checkmodel:point software secureplatform r65 hfa02scope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apache -betascope:eqversion:2.0.28

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.15

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2.27

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-04(x64))

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-01(x64)

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.3.1

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.1

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:network collectorscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.3

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-10

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.96

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.55

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.6-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-10-04

Trust: 0.3

vendor:fujitsumodel:interstage service integrator enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.5-00

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view standard edition 13.3.0ascope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.17

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.2-01

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.0

Trust: 0.3

vendor:fujitsumodel:interstage list manager enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.15-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device manager (solaris (sscope:eqversion:5.9.0-08

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solutionscope:eqversion:3.2

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-01

Trust: 0.3

vendor:sunmodel:secure global desktopscope:eqversion:4.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager enterprise editscope:eqversion:10.1

Trust: 0.3

vendor:hitachimodel:web server (hp-uxscope:eqversion:03-0011.0)

Trust: 0.3

vendor:hitachimodel:web server 2).(solascope:eqversion:04-00-01(*

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager enterprise editscope:eqversion:10.2

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:checkmodel:point software secureplatform ng fp1scope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp3scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.1.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-05

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.45

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-53-01

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:0

Trust: 0.3

vendor:checkmodel:point software endpoint securityscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:7.001

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.4

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel serverscope:eqversion:51.0.2

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:6.4.0-08

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.12

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-30

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device manager (solarisscope:eqversion:5.9-00(x64))

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:checkmodel:point software secureplatform r65.70scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager )scope:eqversion:05-10

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.13

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.68

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:7.0.164

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0.102

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-03

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view standard editionscope:eqversion:13.3

Trust: 0.3

vendor:ciscomodel:video surveillance operations manager softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-08

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-02

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.31

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solutionscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.2

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-08

Trust: 0.3

vendor:apachemodel:software foundation apache betascope:eqversion:2.0.28

Trust: 0.3

vendor:ciscomodel:network collectorscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-04

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.3.1

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.28

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-03(x64))

Trust: 0.3

vendor:checkmodel:point software secureplatform ng fp2scope: - version: -

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.35

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.0-00

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5665

Trust: 0.3

vendor:apachemodel:software foundation apache a9scope:eqversion:2.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:2.0.42

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.2

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-90

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0-103

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00-05

Trust: 0.3

vendor:ibmmodel:os/400 v6r1m0scope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:11.1.1.4

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.0.95

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:0

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.8

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.5-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-10

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.32

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-00-07

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-53

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-90

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.15

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-06

Trust: 0.3

vendor:checkmodel:point software security gatewaysscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:ciscomodel:san-osscope:eqversion:3.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.0-95

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.31

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.41

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:eqversion:6.0.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.59

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel esscope:eqversion:41.0.2

Trust: 0.3

vendor:kolabmodel:groupware server -rc2scope:eqversion:2.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.2

Trust: 0.3

vendor:fujitsumodel:interstage software quality analyzerscope:eqversion:10.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-20

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition bscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.19

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:application stackscope:eqversion:v20

Trust: 0.3

vendor:hitachimodel:jp1/it service level management managerscope:eqversion:-09-50

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-20

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:7.0.163

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.4

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:3.2

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-51-01

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.50

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.5

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.402

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.6

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.7.2

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.0.1-02

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solutionscope:eqversion:2.5

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.4.0-03

Trust: 0.3

vendor:fujitsumodel:interstage application server standard editionscope:eqversion:5.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.7.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.51

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:11.1.1.3

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.17

Trust: 0.3

vendor:hitachimodel:web server 04-00.scope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.18

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:neversion:2.2.20

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.1-73

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-10-01

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-00(x64))

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-00-04

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel serverscope:eqversion:51.0

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:eqversion:6.4.0-08

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.35

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.27

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.4.0-08

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-50-02

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-01

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(rhelscope:eqversion:7.1.0-00

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.1

Trust: 0.3

vendor:apachemodel:software foundation apache 2.3.38-devscope: - version: -

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.3.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.6

Trust: 0.3

vendor:kolabmodel:groupware serverscope:neversion:2.3.3

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0.95

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50-02

Trust: 0.3

vendor:fujitsumodel:interstage application server web-j editionscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-30

Trust: 0.3

vendor:fujitsumodel:interstage service integrator standard editionscope:eqversion:9.0

Trust: 0.3

vendor:checkmodel:point software dlp-1scope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.39

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:10

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:sunmodel:secure global desktopscope:eqversion:4.3

Trust: 0.3

vendor:checkmodel:point software secureplatform r71.30scope: - version: -

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.13

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition bscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-11

Trust: 0.3

vendor:hitachimodel:jp1/cm2/snmp system observer )scope:eqversion:09-00

Trust: 0.3

vendor:hpmodel:system management homepage bscope:eqversion:3.0.2.77

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-00

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.1.0-00

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.2

Trust: 0.3

vendor:oraclemodel:application server 10g r2scope:eqversion:10.1.2.3.0

Trust: 0.3

vendor:kolabmodel:groupware server 2.2-rc1scope: - version: -

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-00-05

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5687

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:fujitsumodel:systemwalker service quality coordinator enterprise editionscope:eqversion:13.4

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.3

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:susemodel:linux enterprise server for vmware sp1scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-10

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.43

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.64

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:jp1/it service level management managerscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-90

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-01

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:5.5.06.00

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.401

Trust: 0.3

vendor:redmodel:hat enterprise linux server 6.0.zscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.46

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.25

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-00-03

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:5.5

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:2.33

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:systemwalker service catalog manager v14gscope:eqversion:14.1

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:10.1.3.5

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.3

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-10-09

Trust: 0.3

vendor:ciscomodel:wide area application services 4.1.1bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solution updatescope:eqversion:2.6

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-11-02

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.14

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-07

Trust: 0.3

vendor:ciscomodel:ciscoworks lan management solution (dec updatescope:eqversion:3.02007

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.4

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.1.91.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-20

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.1

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:8.0.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.23

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:7.0.1-01

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.2-01

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:ciscomodel:wireless control system for linuxscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:2.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.5

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.18

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.62-devscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:5.0.1

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-01(*2)

Trust: 0.3

vendor:kolabmodel:groupware server 2.2-rc3scope: - version: -

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(slesscope:eqversion:7.1.0-00

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-00-04

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device manager (solarisscope:eqversion:5.9-08(x64))

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device manager (solaris (sscope:eqversion:5.9.0-00

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.3

Trust: 0.3

vendor:redmodel:hat enterprise linux 5.3.llscope: - version: -

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.17

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.13

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-00

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel asscope:eqversion:41.0.2

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-00-02

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.9

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:04-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.15

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-02

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.0.0-00

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:redmodel:hat enterprise linux elsscope:eqversion:3

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-30

Trust: 0.3

vendor:hitachimodel:web server (hp-uxscope:eqversion:03-00-0111.0

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.60-devscope: - version: -

Trust: 0.3

vendor:novellmodel:netware sp6scope:eqversion:6.5

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.1.1

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:5.0.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-60-01

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.35

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:novellmodel:netware sp8scope:eqversion:6.5.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:5.0.1

Trust: 0.3

vendor:ciscomodel:mobility services enginescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-40

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system web operation assistantscope:eqversion:3-0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:2.2

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:hitachimodel:replication manager software (solaris(spscope:eqversion:7.1.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.8

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.39

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.0.1-02

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.2-01

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.60

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:systemwalker software configuration managerscope:eqversion:14.1

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-03(x64))

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:ciscomodel:cts telepresence systemsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.13

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:fujitsumodel:interstage service integrator enterprise edition 9.0.0ascope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-09-00-50

Trust: 0.3

vendor:checkmodel:point software secureplatform r75scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-09

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.1

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5632

Trust: 0.3

vendor:checkmodel:point software secureplatform ng fp2 editionscope:eqversion:2

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.0-00(x64))

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.1-01

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.37

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.56

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.3.1

Trust: 0.3

vendor:hitachimodel:web server custom editionscope:eqversion:-0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager standard editioscope:eqversion:10.1

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wireless control system softwarescope:eqversion:4.0.96

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:fujitsumodel:interstage application development cycle manager standard editioscope:eqversion:10.2

Trust: 0.3

vendor:fujitsumodel:interstage list manager standard editionscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:6.0.181.0

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.4

Trust: 0.3

vendor:apachemodel:software foundation apachescope:neversion:2.2.21

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:checkmodel:point software ipso6 r70.40scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:fujitsumodel:interstage software quality analyzer 10.0.0ascope: - version: -

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:sunmodel:secure global desktopscope:neversion:4.62

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-10-10

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-60-01

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-09-10-03

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5150

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.7-devscope: - version: -

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:checkmodel:point software ipso6 r75scope: - version: -

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.19

Trust: 0.3

vendor:hitachimodel:web server 04-00-03.scope: - version: -

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5675

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-03

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10

Trust: 0.3

vendor:oraclemodel:application server 10g r3scope:eqversion:10.1.3.5.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-40

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-02(x64))

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.44

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.3

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition ascope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:1.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-00

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5645

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-40

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.19

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.0.1

Trust: 0.3

vendor:novellmodel:netware sp7scope:eqversion:6.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-00

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:7.1.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2.0-12

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.3

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.9

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-00

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.27

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5655

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-60

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-00-060

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.13

Trust: 0.3

vendor:fujitsumodel:interstage job workload serverscope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning managerscope:eqversion:05-90

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.1

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system web operation assistantscope:eqversion:2-0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:oraclemodel:secure backupscope:eqversion:10.3.0.3

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1

Trust: 0.3

vendor:apachemodel:software foundation apache -betascope:eqversion:2.0.32

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.11

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.38

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:eqversion:6.4.0-08

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.001

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.52

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.17

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.2

Trust: 0.3

vendor:checkmodel:point software secureplatform ngscope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.63

Trust: 0.3

vendor:checkmodel:point software ipso6 r71.30scope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.36

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.402

Trust: 0.3

vendor:checkmodel:point software secureplatform r70.40scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-50

Trust: 0.3

vendor:hitachimodel:web server linuxscope:eqversion:04-10-01

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-10-02

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.1.73

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.18

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.1-00

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.2

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-01

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0.4

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel esscope:eqversion:41.0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:fujitsumodel:cloud infrastructure management softwarescope:eqversion:1.2

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:kolabmodel:groupware serverscope:eqversion:2.2.3

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0.6

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:11.1.1.5

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.4.0-08

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp4scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.0.100.0

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-09-50-01

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.4.0-08

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j edition 6.0ascope: - version: -

Trust: 0.3

vendor:ciscomodel:wireless control systemscope:eqversion:4.2.62.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.1.0-00

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.6

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.3.3

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-03(x64)

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:web server aixscope:eqversion:03-00

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.1.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.16

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-50-03

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-03

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.19

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.2.0-00

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0.5

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.0

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(slesscope:eqversion:7.0.1-01

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.12

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:hpmodel:onboard administratorscope:neversion:3.55

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5135

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.2

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:7.0.0-00

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-60

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.53

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-10-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-05

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tuning manager software (solaris(spscope:eqversion:6.4.0-03

Trust: 0.3

vendor:hitachimodel:web server solarisscope:eqversion:03-00

Trust: 0.3

vendor:ciscomodel:video surveillance managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-08-50-09

Trust: 0.3

vendor:fujitsumodel:systemwalker runbook automation v14g 14.1.0ascope: - version: -

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-51

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:7.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:6.4.0-08

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00-01

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:7.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.7

Trust: 0.3

vendor:hitachimodel:job management partner 1/automatic job management system manscope:eqversion:3-0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:2.0.47

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:ciscoworks common services basescope:eqversion:3.0.3

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:04-10

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.1-01

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0.103

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.32

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.3.0

Trust: 0.3

vendor:hitachimodel:web server )scope:eqversion:04-00

Trust: 0.3

vendor:xeroxmodel:workcentrescope:eqversion:5638

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:10.1.2.3

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.4.0-08

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.0

Trust: 0.3

vendor:checkmodel:point software ipso6 r65.70scope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:checkmodel:point software secureplatform ngx r60 buildscope:eqversion:244

Trust: 0.3

vendor:fujitsumodel:interstage business application server enterprise editionscope:eqversion:8.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-07

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:6.4.0-08

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.48

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition ascope:eqversion:9.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:hitachimodel:jp1/cm2/snmp system observerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:9000

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:oraclemodel:transportation managerscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-10-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand device managerscope:eqversion:05.10

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.0.1-02

Trust: 0.3

vendor:ciscomodel:wireless control system for windowsscope:eqversion:0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.47

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-00(x64))

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/serverconductor/control managerscope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view enterprise editionscope:eqversion:13.3

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-10

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.2

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.33

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:eqversion:6.4.0-08

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.2

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.40

Trust: 0.3

vendor:ciscomodel:quadscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.2-00(x64))

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.43

Trust: 0.3

vendor:hpmodel:onboard administratorscope:eqversion:3.21

Trust: 0.3

vendor:fujitsumodel:systemwalker it process master standard editionscope:eqversion:13.3.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand devicemanagerscope:eqversion:05-50-01

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.1-03

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:4.0.7

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.61

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-01

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.4

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.64-devscope: - version: -

Trust: 0.3

vendor:hitachimodel:job management partner 1/automatic job management system webscope:eqversion:3-0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.1.6

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50-01

Trust: 0.3

sources: CERT/CC: VU#405811 // BID: 49303 // NVD: CVE-2011-3192

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3192
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#405811
value: 16.01

Trust: 0.8

VULMON: CVE-2011-3192
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-3192
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

sources: CERT/CC: VU#405811 // VULMON: CVE-2011-3192 // NVD: CVE-2011-3192

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.0

sources: NVD: CVE-2011-3192

THREAT TYPE

remote

Trust: 0.6

sources: PACKETSTORM: 104711 // PACKETSTORM: 104784 // PACKETSTORM: 105160 // PACKETSTORM: 105288 // PACKETSTORM: 105120 // PACKETSTORM: 105184

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 49303

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2011-3192

PATCH

title:Ubuntu Security Notice: apache2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1199-1

Trust: 0.1

title:Cisco: Apache HTTPd Range Header Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20110830-apache

Trust: 0.1

title:Debian Security Advisories: DSA-2298-2 apache2 -- denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=7227b6751a2a5332a53278f1881d559f

Trust: 0.1

title:Amazon Linux AMI: ALAS-2011-001url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2011-001

Trust: 0.1

title:Red Hat: Moderate: httpd security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120542 - Security Advisory

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2011-3192

Trust: 0.1

title:MNCanyonurl:https://github.com/MNCanyon/MNCanyon

Trust: 0.1

title:haproxy-ddosurl:https://github.com/analytically/haproxy-ddos

Trust: 0.1

title:DDoS-Scripturl:https://github.com/Encapsulate/DDoS-Script

Trust: 0.1

title:Mind_helpurl:https://github.com/MNCanyon/Mind_help

Trust: 0.1

title:DC-p0turl:https://github.com/5p1n6a11/DC-p0t

Trust: 0.1

sources: VULMON: CVE-2011-3192

EXTERNAL IDS

db:NVDid:CVE-2011-3192

Trust: 2.5

db:CERT/CCid:VU#405811

Trust: 1.8

db:BIDid:49303

Trust: 1.3

db:SECUNIAid:46000

Trust: 1.0

db:SECUNIAid:46126

Trust: 1.0

db:SECUNIAid:45937

Trust: 1.0

db:SECUNIAid:46125

Trust: 1.0

db:SECUNIAid:45606

Trust: 1.0

db:EXPLOIT-DBid:17696

Trust: 1.0

db:SECTRACKid:1025960

Trust: 1.0

db:OSVDBid:74721

Trust: 1.0

db:HITACHIid:HS11-021

Trust: 0.4

db:HITACHIid:HS11-020

Trust: 0.4

db:HITACHIid:HS11-022

Trust: 0.4

db:HITACHIid:HS11-019

Trust: 0.3

db:JUNIPERid:JSA10642

Trust: 0.3

db:SECUNIAid:46229

Trust: 0.2

db:VULMONid:CVE-2011-3192

Trust: 0.1

db:PACKETSTORMid:104711

Trust: 0.1

db:PACKETSTORMid:104618

Trust: 0.1

db:PACKETSTORMid:114141

Trust: 0.1

db:PACKETSTORMid:104784

Trust: 0.1

db:PACKETSTORMid:105422

Trust: 0.1

db:PACKETSTORMid:105160

Trust: 0.1

db:PACKETSTORMid:105288

Trust: 0.1

db:PACKETSTORMid:105120

Trust: 0.1

db:PACKETSTORMid:105184

Trust: 0.1

db:PACKETSTORMid:111957

Trust: 0.1

db:PACKETSTORMid:106388

Trust: 0.1

db:PACKETSTORMid:106557

Trust: 0.1

sources: CERT/CC: VU#405811 // VULMON: CVE-2011-3192 // BID: 49303 // PACKETSTORM: 104711 // PACKETSTORM: 104618 // PACKETSTORM: 114141 // PACKETSTORM: 104784 // PACKETSTORM: 105422 // PACKETSTORM: 105160 // PACKETSTORM: 105288 // PACKETSTORM: 105120 // PACKETSTORM: 105184 // PACKETSTORM: 111957 // PACKETSTORM: 106388 // PACKETSTORM: 106557 // NVD: CVE-2011-3192

REFERENCES

url:http://www.apache.org/dist/httpd/announcement2.2.html

Trust: 2.1

url:http://www.oracle.com/technetwork/topics/security/alert-cve-2011-3192-485304.html

Trust: 1.3

url:https://issues.apache.org/bugzilla/show_bug.cgi?id=51714

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html

Trust: 1.3

url:http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122d387dd@minotaur.apache.org%3e

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-1199-1

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3192

Trust: 1.1

url:http://seclists.org/fulldisclosure/2011/aug/175

Trust: 1.1

url:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://osvdb.org/74721

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a18827

Trust: 1.0

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b90d73.shtml

Trust: 1.0

url:https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/69396

Trust: 1.0

url:http://secunia.com/advisories/46000

Trust: 1.0

url:http://support.apple.com/kb/ht5002

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=132033751509019&w=2

Trust: 1.0

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html

Trust: 1.0

url:http://www.exploit-db.com/exploits/17696

Trust: 1.0

url:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14762

Trust: 1.0

url:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/46126

Trust: 1.0

url:https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://mail-archives.apache.org/mod_mbox/httpd-dev/201108.mbox/%3ccaapsnn2po-d-c4nqt_tes2rrwizr7urefhtkpwbc1b+k1dqc7g%40mail.gmail.com%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14824

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=133951357207000&w=2

Trust: 1.0

url:http://secunia.com/advisories/45937

Trust: 1.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=732928

Trust: 1.0

url:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=131731002122529&w=2

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00003.html

Trust: 1.0

url:https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://archives.neohapsis.com/archives/fulldisclosure/2011-08/0285.html

Trust: 1.0

url:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2011:130

Trust: 1.0

url:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2013:150

Trust: 1.0

url:https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2011-1294.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html

Trust: 1.0

url:http://blogs.oracle.com/security/entry/security_alert_for_cve_2011

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2011-1300.html

Trust: 1.0

url:http://secunia.com/advisories/46125

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2011-1330.html

Trust: 1.0

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=131551295528105&w=2

Trust: 1.0

url:https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=133477473521382&w=2

Trust: 1.0

url:http://securitytracker.com/id?1025960

Trust: 1.0

url:http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122d387dd%40minotaur.apache.org%3e

Trust: 1.0

url:http://secunia.com/advisories/45606

Trust: 1.0

url:http://www.kb.cert.org/vuls/id/405811

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2011-1369.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2011-1329.html

Trust: 1.0

url:http://www.securityfocus.com/bid/49303

Trust: 1.0

url:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=134987041210674&w=2

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2011-1245.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html

Trust: 1.0

url:http://www.gossamer-threads.com/lists/apache/dev/401638

Trust: 1.0

url:http://blog.spiderlabs.com/2011/08/mitigation-of-apache-range-header-dos-attack.html

Trust: 0.8

url:http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110826103531.998348f82@minotaur.apache.org%3e

Trust: 0.8

url:http://www.apache.org/dist/httpd/changes_2.2.20

Trust: 0.8

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/./vuls/hs11-020/index.html

Trust: 0.4

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/./vuls/hs11-021/index.html

Trust: 0.4

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/./vuls/hs11-022/index.html

Trust: 0.4

url:http://www.cisco.com/warp/public/707/cisco-sa-20110830-apache.shtml

Trust: 0.4

url:http://rhn.redhat.com/errata/rhsa-2011-1300.html

Trust: 0.4

url:https://rhn.redhat.com/errata/rhsa-2011-1330.html

Trust: 0.4

url:http://kolab.org/pipermail/kolab-announce/2011/000102.html

Trust: 0.3

url:http://kolab.org/pipermail/kolab-announce/2011/000103.html

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10642&cat=sirt_1&actp=list

Trust: 0.3

url:http://httpd.apache.org/download.cgi

Trust: 0.3

url:https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk65222

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/alerts-086861.html#securityalerts

Trust: 0.3

url:http://blogs.oracle.com/sunsecurity/entry/cve_2011_3192_and_cve

Trust: 0.3

url:http://blogs.oracle.com/sunsecurity/entry/cve_2011_3192_denial_of

Trust: 0.3

url:http://marc.info/?l=apache-httpd-dev&m=131418828705324&w=2

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7009621

Trust: 0.3

url:/archive/1/520376

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100148618

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03285138

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03315912

Trust: 0.3

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03517954&ac.admitted=1349807398574.876444892.199480143

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-019/index.html

Trust: 0.3

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-201102e.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21512087

Trust: 0.3

url:http://httpd.apache.org/security/cve-2011-3192.txt

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2011-1329.html

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=nas2aae02620b9b78d9e862578fe003c799b

Trust: 0.3

url:http://www.xerox.com/download/security/security-bulletin/1284345-ee19-4bf3860908380/cert_xrx12-004_v1.01.pdf

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3348

Trust: 0.3

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.3

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://www.redhat.com/security/data/cve/cve-2011-3192.html

Trust: 0.3

url:http://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3192

Trust: 0.2

url:http://www.mandriva.com/security/

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://www.mandriva.com/security/advisories

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-0419

Trust: 0.2

url:https://www.hp.com/go/swa

Trust: 0.2

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.2

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:https://launchpad.net/ubuntu/+source/apache2/2.2.17-1ubuntu1.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apache2/2.2.16-1ubuntu3.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apache2/2.2.8-1ubuntu0.21

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apache2/2.2.14-5ubuntu8.6

Trust: 0.1

url:http://tools.cisco.com/security/center/viewambalert.x?alertid=24024

Trust: 0.1

url:http://www.cisco.com/go/psirt

Trust: 0.1

url:http://www.cisco.com/en/us/support/tsd_cisco_worldwide_contacts.html

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html

Trust: 0.1

url:http://www.cisco.com/en/us/docs/general/warranty/english/eu1ken_.html

Trust: 0.1

url:http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html

Trust: 0.1

url:http://www.cisco.com

Trust: 0.1

url:http://www.cisco.com/public/sw-center/sw-usingswc.shtml

Trust: 0.1

url:http://intellishield.cisco.com/security/alertmanager/cvss

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0434

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0031

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3368

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0031

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3368

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1452

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4317

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0053

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3348

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4317

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3607

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0021

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3607

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201206-25.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0434

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0053

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2791

Trust: 0.1

url:http://store.mandriva.com/product_info.php?cpath=149&amp;products_id=490

Trust: 0.1

url:https://ftp.usa.hp.com/hprc

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver&downloadtype=securitypatches&version=1.0.2

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-1294.html

Trust: 0.1

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h20000.www2.hp.com/bizsupport/techsupport/softwareindex.jsp?lang=en&cc=us&prodnameid=3188475&prodtypeid=329290&prodseriesid=3188465&swlang=8&taskid=135&swenvoid=1113

Trust: 0.1

url:http://secunia.com/advisories/46229/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46229

Trust: 0.1

url:http://secunia.com/advisories/46229/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#405811 // BID: 49303 // PACKETSTORM: 104711 // PACKETSTORM: 104618 // PACKETSTORM: 114141 // PACKETSTORM: 104784 // PACKETSTORM: 105422 // PACKETSTORM: 105160 // PACKETSTORM: 105288 // PACKETSTORM: 105120 // PACKETSTORM: 105184 // PACKETSTORM: 111957 // PACKETSTORM: 106388 // PACKETSTORM: 106557 // NVD: CVE-2011-3192

CREDITS

Kingcope

Trust: 0.3

sources: BID: 49303

SOURCES

db:CERT/CCid:VU#405811
db:VULMONid:CVE-2011-3192
db:BIDid:49303
db:PACKETSTORMid:104711
db:PACKETSTORMid:104618
db:PACKETSTORMid:114141
db:PACKETSTORMid:104784
db:PACKETSTORMid:105422
db:PACKETSTORMid:105160
db:PACKETSTORMid:105288
db:PACKETSTORMid:105120
db:PACKETSTORMid:105184
db:PACKETSTORMid:111957
db:PACKETSTORMid:106388
db:PACKETSTORMid:106557
db:NVDid:CVE-2011-3192

LAST UPDATE DATE

2025-04-28T21:49:49.532000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#405811date:2011-09-19T00:00:00
db:VULMONid:CVE-2011-3192date:2022-09-19T00:00:00
db:BIDid:49303date:2015-05-07T17:20:00
db:NVDid:CVE-2011-3192date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#405811date:2011-08-26T00:00:00
db:VULMONid:CVE-2011-3192date:2011-08-29T00:00:00
db:BIDid:49303date:2011-08-24T00:00:00
db:PACKETSTORMid:104711date:2011-09-02T00:03:29
db:PACKETSTORMid:104618date:2011-08-31T01:47:39
db:PACKETSTORMid:114141date:2012-06-24T23:54:52
db:PACKETSTORMid:104784date:2011-09-04T17:36:46
db:PACKETSTORMid:105422date:2011-09-29T18:05:00
db:PACKETSTORMid:105160date:2011-09-15T23:53:02
db:PACKETSTORMid:105288date:2011-09-22T05:49:08
db:PACKETSTORMid:105120date:2011-09-14T22:52:49
db:PACKETSTORMid:105184date:2011-09-17T19:02:19
db:PACKETSTORMid:111957date:2012-04-18T23:29:12
db:PACKETSTORMid:106388date:2011-10-31T07:51:54
db:PACKETSTORMid:106557date:2011-11-03T22:08:17
db:NVDid:CVE-2011-3192date:2011-08-29T15:55:02.017