ID

VAR-201412-0615


CVE

CVE-2014-9293


TITLE

NTP Project Network Time Protocol daemon (ntpd) contains multiple vulnerabilities (Updated)

Trust: 0.8

sources: CERT/CC: VU#852879

DESCRIPTION

The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack. The NTP Project ntpd version 4.2.7 and pervious versions contain several vulnerabilities. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys. These vulnerabilities may affect ntpd acting as a server or client. Supplementary information : CWE Vulnerability types by CWE-332: Insufficient Entropy in PRNG (PRNG Insufficient entropy in ) Has been identified. http://cwe.mitre.org/data/definitions/332.htmlBrute force attack by a third party (Brute force attack) Could be used to break cryptographic protection mechanisms. NTP is prone to a security weakness. An attacker can exploit this issue to guess the generated key, and possibly use it to send an ntpdc query or configuration requests. Network Time Protocol is prone to an unspecified security vulnerability. Little is known about this issue or its effects at this time. We will update this BID as more information emerges. Network Time Protocol 4.2.7 is vulnerable; other versions may also be affected. Corrected: 2014-14-22 19:07:16 UTC (stable/10, 10.1-STABLE) 2014-12-23 22:56:01 UTC (releng/10.1, 10.1-RELEASE-p3) 2014-12-23 22:55:14 UTC (releng/10.0, 10.0-RELEASE-p15) 2014-14-22 19:08:09 UTC (stable/9, 9.3-STABLE) 2014-12-23 22:54:25 UTC (releng/9.3, 9.3-RELEASE-p7) 2014-12-23 22:53:44 UTC (releng/9.2, 9.2-RELEASE-p17) 2014-12-23 22:53:03 UTC (releng/9.1, 9.1-RELEASE-p24) 2014-14-22 19:08:09 UTC (stable/8, 8.4-STABLE) 2014-12-23 22:52:22 UTC (releng/8.4, 8.4-RELEASE-p21) CVE Name: CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:https://security.FreeBSD.org/>. II. [CVE-2014-9293] The ntp-keygen(8) utility is also affected by a similar issue. [CVE-2014-9294] When Autokey Authentication is enabled, for example if ntp.conf(5) contains a 'crypto pw' directive, a remote attacker can send a carefully crafted packet that can overflow a stack buffer. [CVE-2014-9296] III. Impact The NTP protocol uses keys to implement authentication. The weak seeding of the pseudo-random number generator makes it easier for an attacker to brute-force keys, and thus may broadcast incorrect time stamps or masquerade as another time server. [CVE-2014-9295] IV. Workaround No workaround is available, but systems not running ntpd(8) are not affected. Because the issue may lead to remote root compromise, the FreeBSD Security Team recommends system administrators to firewall NTP ports, namely tcp/123 and udp/123 when it is not clear that all systems have been patched or have ntpd(8) stopped. V. Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch https://security.FreeBSD.org/patches/SA-14:31/ntp.patch # fetch https://security.FreeBSD.org/patches/SA-14:31/ntp.patch.asc # gpg --verify ntp.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. Restart the ntpd(8) daemons, or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/8/ r276073 releng/8.4/ r276154 stable/9/ r276073 releng/9.1/ r276155 releng/9.2/ r276156 releng/9.3/ r276157 stable/10/ r276072 releng/10.0/ r276158 releng/10.1/ r276159 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. This situation may be exploitable by an attacker (CVE-2014-9296). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296 http://advisories.mageia.org/MGASA-2014-0541.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: 25fe56fc0649ac9bb83be467969c2380 mbs1/x86_64/ntp-4.2.6p5-8.1.mbs1.x86_64.rpm 9409f5337bc2a2682e09db81e769cd5c mbs1/x86_64/ntp-client-4.2.6p5-8.1.mbs1.x86_64.rpm df65cc9c536cdd461e1ef95318ab0d3b mbs1/x86_64/ntp-doc-4.2.6p5-8.1.mbs1.x86_64.rpm 53f446bffdf6e87726a9772e946c5e34 mbs1/SRPMS/ntp-4.2.6p5-8.1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c04916783 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04916783 Version: 1 HPSBHF03432 rev.1 - HPE Networking Comware 5, Comware 5 Low Encryption SW, Comware 7, VCX Using NTP, Remote Access Restriction Bypass and Code Execution NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-12-09 Last Updated: 2015-12-09 Potential Security Impact: Remote Access Restriction Bypass, Code Execution Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HPE Networking Comware 5, Comware 5, Low Encryption SW, Comware 7, and VCX, Using NTP. The vulnerabilities could be remotely exploited resulting in resulting in remote access restriction bypass and code execution. References: SSRT101878 CVE-2014-9293 CVE-2014-9294 CVE-2014-9295 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. See the RESOLUTION section for a list of impacted hardware and Comware 5, Comware 5 Low Encryption SW, Comware 7, and VCX versions. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-9293 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-9294 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-9295 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION Hewlett Packard Enterprise has provided updated Comware 5, Comware 5 Low Encryption SW, Comware 7 and VCX to address this on Impacted Hewlett Packard Enterprise products. Family Fixed Version HP Branded Products Impacted H3C Branded Products Impacted CVE # 8800 (Comware 5) R3627P04 JC137A HP 8805/8808/8812 (2E) Main Control Unit Module, JC138A HP 8805/8808/8812 (1E) Main Control Unit Module, JC141A HP 8802 Main Control Unit Module, JC147A HP 8802 Router Chassis, JC147B HP 8802 Router Chassis, JC148A HP 8805 Router Chassis, JC148B HP 8805 Router Chassis, JC149A HP 8808 Router Chassis, JC149B HP 8808 Router Chassis, JC150A HP 8812 Router Chassis, JC150B HP 8812 Router Chassis, JC596A HP 8800 Dual Fabric Main Processing Unit, JC597A HP 8800 Single Fabric Main Processing Unit CVE-2014-9295 A6600 (Comware 5) R3303P18 JC165A HP 6600 RPE-X1 Router Module, JC177A HP 6608 Router, JC177B HP 6608 Router Chassis, JC178A HP 6604 Router Chassis, JC178B HP 6604 Router Chassis, JC496A HP 6616 Router Chassis, JC566A HP 6600 RSE-X1 Router Main Processing Unit, JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit, JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit CVE-2014-9295 HSR6602 (Comware 5) R3303P18 JC176A HP 6602 Router Chassis, JG353A HP HSR6602-G Router, JG354A HP HSR6602-XG Router, JG355A HP 6600 MCP-X1 Router Main Processing Unit, JG356A HP 6600 MCP-X2 Router Main Processing Unit, JG776A HP HSR6602-G TAA-compliant Router, JG777A HP HSR6602-XG TAA-compliant Router, JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit CVE-2014-9295 HSR6800 (Comware 5) R3303P18 JG361A HP HSR6802 Router Chassis, JG362A HP HSR6804 Router Chassis, JG363A HP HSR6808 Router Chassis, JG364A HP HSR6800 RSE-X2 Router Main Processing Unit, JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit CVE-2014-9295 MSR20 (Comware 5) R2513P45 JD432A HP A-MSR20-21 Router, JD662A HP MSR20-20 Router, JD663A HP A-MSR20-21 Router, JD663B HP MSR20-21 Router, JD664A HP MSR20-40 Router, JF228A HP MSR20-40 Router, JF283A HP MSR20-20 Router CVE-2014-9295 MSR20-1X (Comware 5) R2513P45 JD431A HP MSR20-10 Router, JD667A HP MSR20-15 IW Multi-Service Router, JD668A HP MSR20-13 Multi-Service Router, JD669A HP MSR20-13 W Multi-Service Router, JD670A HP MSR20-15 A Multi-Service Router, JD671A HP MSR20-15 AW Multi-Service Router, JD672A HP MSR20-15 I Multi-Service Router, JD673A HP MSR20-11 Multi-Service Router, JD674A HP MSR20-12 Multi-Service Router, JD675A HP MSR20-12 W Multi-Service Router, JD676A HP MSR20-12 T1 Multi-Service Router, JF236A HP MSR20-15-I Router, JF237A HP MSR20-15-A Router, JF238A HP MSR20-15-I-W Router, JF239A HP MSR20-11 Router, JF240A HP MSR20-13 Router, JF241A HP MSR20-12 Router, JF806A HP MSR20-12-T Router, JF807A HP MSR20-12-W Router, JF808A HP MSR20-13-W Router, JF809A HP MSR20-15-A-W Router, JF817A HP MSR20-15 Router, JG209A HP MSR20-12-T-W Router (NA), JG210A HP MSR20-13-W Router (NA) H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1, H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393), H3C RT-MSR2015-AC-OVS-I-H3 (0235A394), H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V), H3C MSR 20-11 (0235A31V), H3C MSR 20-12 (0235A32E), H3C MSR 20-12 T1 (0235A32B), H3C MSR 20-13 (0235A31W), H3C MSR 20-13 W (0235A31X), H3C MSR 20-15 A (0235A31Q), H3C MSR 20-15 A W (0235A31R), H3C MSR 20-15 I (0235A31N), H3C MSR 20-15 IW (0235A31P), H3C MSR20-12 W (0235A32G) CVE-2014-9295 MSR 30 (Comware 5) R2513P45 JD654A HP MSR30-60 POE Multi-Service Router, JD657A HP MSR30-40 Multi-Service Router, JD658A HP MSR30-60 Multi-Service Router, JD660A HP MSR30-20 POE Multi-Service Router, JD661A HP MSR30-40 POE Multi-Service Router, JD666A HP MSR30-20 Multi-Service Router, JF229A HP MSR30-40 Router, JF230A HP MSR30-60 Router, JF232A HP RTMSR3040-AC-OVSAS-H3, JF235A HP MSR30-20 DC Router, JF284A HP MSR30-20 Router, JF287A HP MSR30-40 DC Router, JF801A HP MSR30-60 DC Router, JF802A HP MSR30-20 PoE Router, JF803A HP MSR30-40 PoE Router, JF804A HP MSR30-60 PoE Router H3C MSR 30-20 Router (0235A328), H3C MSR 30-40 Router Host(DC) (0235A268), H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322), H3C RT-MSR3020-DC-OVS-H3 (0235A267), H3C RT-MSR3040-AC-OVS-H (0235A299), H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323), H3C RT-MSR3060-AC-OVS-H3 (0235A320), H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296), H3C RT-MSR3060-DC-OVS-H3 (0235A269), H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S), H3C MSR 30-20 (0235A19L), H3C MSR 30-20 POE (0235A239), H3C MSR 30-40 (0235A20J), H3C MSR 30-40 POE (0235A25R), H3C MSR 30-60 (0235A20K), H3C MSR 30-60 POE (0235A25S), H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V) CVE-2014-9295 MSR 30-16 (Comware 5) R2513P45 JD659A HP MSR30-16 POE Multi-Service Router, JD665A HP MSR30-16 Multi-Service Router, JF233A HP MSR30-16 Router, JF234A HP MSR30-16 PoE Router, H3C RT-MSR3016-AC-OVS-H3 (0235A327), H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321), H3C MSR 30-16 (0235A237), H3C MSR 30-16 POE (0235A238) CVE-2014-9295 MSR 30-1X (Comware 5) R2513P45 JF800A HP MSR30-11 Router, JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr, JG182A HP MSR30-11E Router, JG183A HP MSR30-11F Router, JG184A HP MSR30-10 DC Router 2FE 2SIC 1XMIM 256DDR (0235A39H), H3C RT-MSR3011-AC-OVS-H3 (0235A29L) CVE-2014-9295 MSR 50 (Comware 5) R2513P45 JD433A HP MSR50-40 Router, JD653A HP MSR50 Processor Module, JD655A HP MSR50-40 Multi-Service Router, JD656A HP MSR50-60 Multi-Service Router, JF231A HP MSR50-60 Router, JF285A HP MSR50-40 DC Router, JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297), H3C MSR5040-DCOVS-H3C (0235A20P), H3C RT-MSR5060-AC-OVS-H3 (0235A298), H3C MSR 50-40 Chassis (0235A20N), H3C MSR 50-60 Chassis (0235A20L) CVE-2014-9295 MSR 50-G2 (Comware 5) R2513P45 JD429A HP MSR50 G2 Processor Module, JD429B HP MSR50 G2 Processor Module H3C H3C MSR 50 Processor Module-G2 (0231A84Q), H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD (0231A0KL) CVE-2014-9295 MSR 9XX (Comware 5) R2513P45 JF812A HP MSR900 Router, JF813A HP MSR920 Router, JF814A HP MSR900-W Router, JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr, JG207A HP MSR900-W Router (NA), JG208A HP MSR920-W Router (NA) H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b (0235A0C2), H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX), H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4), H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0) CVE-2014-9295 MSR 93X (Comware 5) R2513P45 JG512A HP MSR930 Wireless Router, JG513A HP MSR930 3G Router, JG514A HP MSR931 Router, JG515A HP MSR931 3G Router, JG516A HP MSR933 Router, JG517A HP MSR933 3G Router, JG518A HP MSR935 Router, JG519A HP MSR935 Wireless Router, JG520A HP MSR935 3G Router, JG531A HP MSR931 Dual 3G Router, JG596A HP MSR930 4G LTE/3G CDMA Router, JG597A HP MSR936 Wireless Router, JG665A HP MSR930 4G LTE/3G WCDMA Global Router, JG704A HP MSR930 4G LTE/3G WCDMA ATT Router N/A CVE-2014-9295 MSR1000 (Comware 5) R2513P45 JG732A HP MSR1003-8 AC Router N/A CVE-2014-9295 MSR20 (Comware 5 - Low Encryption SW) R2513L61 JD663B HP MSR20-21 Router, JF228A HP MSR20-40 Router, JF283A HP MSR20-20 Router H3C RT-MSR2020-AC-OVS-H3C (0235A324), H3C RT-MSR2040-AC-OVS-H3 (0235A326) CVE-2014-9295 MSR20-1X (Comware 5 - Low Encryption SW) R2513L61 JD431A HP MSR20-10 Router, JF236A HP MSR20-15-I Router, JF237A HP MSR20-15-A Router, JF238A HP MSR20-15-I-W Router, JF239A HP MSR20-11 Router, JF240A HP MSR20-13 Router, JF241A HP MSR20-12 Router, JF806A HP MSR20-12-T Router, JF807A HP MSR20-12-W Router, JF808A HP MSR20-13-W Router, JF809A HP MSR20-15-A-W Router, JF817A HP MSR20-15 Router H3C MSR 20-10 (0235A0A7), H3C RT-MSR2015-AC-OVS-I-H3 (0235A394), H3C RT-MSR2015-AC-OVS-A-H3 (0235A392), H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393), H3C RT-MSR2011-AC-OVS-H3 (0235A395), H3C RT-MSR2013-AC-OVS-H3 (0235A390), H3C RT-MSR2012-AC-OVS-H3 (0235A396), H3C RT-MSR2012-TAC-OVS-H3 (0235A398), H3C RT-MSR2012-AC-OVS-W-H3 (0235A397), H3C RT-MSR2013-AC-OVS-W-H3 (0235A391), H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V), H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8) CVE-2014-9295 MSR30 (Comware 5 - Low Encryption SW) R2513L61 JF229A HP MSR30-40 Router, JF230A HP MSR30-60 Router, JF235A HP MSR30-20 DC Router, JF284A HP MSR30-20 Router, JF287A HP MSR30-40 DC Router, JF801A HP MSR30-60 DC Router, JF802A HP MSR30-20 PoE Router, JF803A HP MSR30-40 PoE Router, JF804A HP MSR30-60 PoE Router H3C RT-MSR3040-AC-OVS-H (0235A299), H3C RT-MSR3060-AC-OVS-H3 (0235A320), H3C RT-MSR3020-DC-OVS-H3 (0235A267), H3C MSR 30-20 Router (0235A328), H3C MSR 30-40 Router Host(DC) (0235A268), H3C RT-MSR3060-DC-OVS-H3 (0235A269), H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322), H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323), H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296) CVE-2014-9295 MSR30-16 (Comware 5 - Low Encryption SW) R2513L61 JF233A HP MSR30-16 Router, JF234A HP MSR30-16 PoE Router H3C RT-MSR3016-AC-OVS-H3 (0235A327), H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321) CVE-2014-9295 MSR30-1X (Comware 5 - Low Encryption SW) R2513L61 JF800A HP MSR30-11 Router, JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr, JG182A HP MSR30-11E Router, JG183A HP MSR30-11F Router, JG184A HP MSR30-10 DC Router H3C RT-MSR3011-AC-OVS-H3 (0235A29L), H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H) CVE-2014-9295 MSR50 (Comware 5 - Low Encryption SW) R2513L61 JD433A HP MSR50-40 Router, JD653A HP MSR50Processor Module, JD655A HP MSR50-40 Multi-Service Router, JD656A HP MSR50-60 Multi-Service Router, JF231A HP MSR50-60 Router, JF285A HP MSR50-40 DC Router, JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply H3C MSR 50-40 Router (0235A297), H3C MSR 50 Processor Module (0231A791), H3C MSR 50-40 Chassis (0235A20N), H3C MSR 50-60 Chassis (0235A20L), H3C RT-MSR5060-AC-OVS-H3 (0235A298), H3C MSR5040-DCOVS-H3C (0235A20P) CVE-2014-9295 MSR50 G2 (Comware 5 - Low Encryption SW) R2513L61 JD429B HP MSR50 G2 Processor Module H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD (0231A0KL) CVE-2014-9295 12500 (Comware 5) R1828P06 JC085A HP A12518 Switch Chassis, JC086A HP A12508 Switch Chassis, JC652A HP 12508 DC Switch Chassis, JC653A HP 12518 DC Switch Chassis, JC654A HP 12504 AC Switch Chassis, JC655A HP 12504 DC Switch Chassis, JF430A HP A12518 Switch Chassis, JF430B HP 12518 Switch Chassis, JF430C HP 12518 AC Switch Chassis, JF431A HP A12508 Switch Chassis, JF431B HP 12508 Switch Chassis, JF431C HP 12508 AC Switch Chassis, JC072B HP 12500 Main Processing Unit, JC808A HP 12500 TAA Main Processing Unit H3C S12508 Routing Switch (AC-1) (0235A0GE), H3C S12518 Routing Switch (AC-1) (0235A0GF), H3C S12508 Chassis (0235A0E6), H3C S12508 Chassis (0235A38N), H3C S12518 Chassis (0235A0E7), H3C S12518 Chassis (0235A38M), H3C 12508 DC Switch Chassis (0235A38L), H3C 12518 DC Switch Chassis (0235A38K) CVE-2014-9295 9500E (Comware 5) R1828P06 JC124A HP A9508 Switch Chassis, JC124B HP 9505 Switch Chassis, JC125A HP A9512 Switch Chassis, JC125B HP 9512 Switch Chassis, JC474A HP A9508-V Switch Chassis, JC474B HP 9508-V Switch Chassis H3C S9505E Routing-Switch Chassis (0235A0G6), H3C S9512E Routing-Switch Chassis (0235A0G7), H3C S9508E-V Routing-Switch Chassis (0235A38Q), H3C S9505E Chassis w/ Fans (0235A38P), H3C S9512E Chassis w/ Fans (0235A38R) CVE-2014-9295 10500 (Comware 5) R1208P10 JC611A HP 10508-V Switch Chassis, JC612A HP 10508 Switch Chassis, JC613A HP 10504 Switch Chassis, JC614A HP 10500 Main Processing Unit, JC748A HP 10512 Switch Chassis, JG375A HP 10500 TAA-compliant Main Processing Unit, JG820A HP 10504 TAA-compliant Switch Chassis, JG821A HP 10508 TAA-compliant Switch Chassis, JG822A HP 10508-V TAA-compliant Switch Chassis, JG823A HP 10512 TAA-compliant Switch Chassis CVE-2014-9295 7500 (Comware 5) R6708P10 JC666A HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port Gig-T/4-port GbE Combo, JC697A HP 7502 TAA-compliant Main Processing Unit, JC698A HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8 GbE Combo Ports, JC699A HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP Ports, JC700A HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit, JC701A HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit, JD193A HP 7500 384Gbps Fabric Module with 2 XFP Ports, JD193B HP 7500 384Gbps Fabric Module with 2 XFP Ports, JD194A HP 7500 384Gbps Fabric Module, JD194B HP 7500 384Gbps Fabric Module, JD195A HP 7500 384Gbps Advanced Fabric Module, JD196A HP 7502 Fabric Module, JD220A HP 7500 768Gbps Fabric Module, JD224A HP 7500 384Gbps Fabric Module with 12 SFP Ports, JD238A HP 7510 Switch Chassis, JD238B HP 7510 Switch Chassis, JD239A HP 7506 Switch Chassis, JD239B HP 7506 Switch Chassis, JD240A HP 7503 Switch Chassis, JD240B HP 7503 Switch Chassis, JD241A HP 7506-V Switch Chassis, JD241B HP 7506-V Switch Chassis, JD242A HP 7502 Switch Chassis, JD242B HP 7502 Switch Chassis, JD243A HP 7503-S Switch Chassis with 1 Fabric Slot, JD243B HP 7503-S Switch Chassis with 1 Fabric Slot, JE164A HP E7902 Switch Chassis, JE165A HP E7903 Switch Chassis, JE166A HP E7903 1 Fabric Slot Switch Chassis, JE167A HP E7906 Switch Chassis, JE168A HP E7906 Vertical Switch Chassis, JE169A HP E7910 Switch Chassis CVE-2014-9295 5830 (Comware 5) R1118P11 JC691A HP 5830AF-48G Switch with 1 Interface Slot, JC694A HP 5830AF-96G Switch, JG316A HP 5830AF-48G TAA-compliant Switch w/1 Interface Slot, JG374A HP 5830AF-96G TAA-compliant Switch CVE-2014-9295 5800 (Comware 5) R1809P03 JC099A HP 5800-24G-PoE Switch, JC099B HP 5800-24G-PoE+ Switch, JC100A HP 5800-24G Switch, JC100B HP 5800-24G Switch, JC101A HP 5800-48G Switch with 2 Slots, JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots, JC103A HP 5800-24G-SFP Switch, JC103B HP 5800-24G-SFP Switch with 1 Interface Slot, JC104A HP 5800-48G-PoE Switch, JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot, JC105A HP 5800-48G Switch, JC105B HP 5800-48G Switch with 1 Interface Slot, JG254A HP 5800-24G-PoE+ TAA-compliant Switch, JG254B HP 5800-24G-PoE+ TAA-compliant Switch, JG255A HP 5800-24G TAA-compliant Switch, JG255B HP 5800-24G TAA-compliant Switch, JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot, JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot, JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot, JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot, JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot, JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot, JG225A HP 5800AF-48G Switch, JG225B HP 5800AF-48G Switch, JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots, JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface CVE-2014-9295 5820 (Comware 5) R1809P03 JG243A HP 5820-24XG-SFP+ TAA-compliant Switch, JG243B HP 5820-24XG-SFP+ TAA-compliant Switch, JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots & 1 OAA Slot, JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots and 1 OAA Slot, JC106A HP 5820-14XG-SFP+ Switch with 2 Slots, JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot, JG219A HP 5820AF-24XG Switch, JG219B HP 5820AF-24XG Switch, JC102A HP 5820-24XG-SFP+ Switch, JC102B HP 5820-24XG-SFP+ Switch CVE-2014-9295 5500 HI (Comware 5) R5501P06 JG311A HP 5500-24G-4SFP HI Switch with 2 Interface Slots, JG312A HP 5500-48G-4SFP HI Switch with 2 Interface Slots, JG541A HP 5500-24G-PoE+-4SFP HI Switch with 2 Interface Slots, JG542A HP 5500-48G-PoE+-4SFP HI Switch with 2 Interface Slots, JG543A HP 5500-24G-SFP HI Switch with 2 Interface Slots, JG679A HP 5500-24G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface Slots, JG680A HP 5500-48G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface Slots, JG681A HP 5500-24G-SFP HI TAA-compliant Switch with 2 Interface Slots CVE-2014-9295 5500 EI (Comware 5) R2221P08 JD373A HP 5500-24G DC EI Switch, JD374A HP 5500-24G-SFP EI Switch, JD375A HP 5500-48G EI Switch, JD376A HP 5500-48G-PoE EI Switch, JD377A HP 5500-24G EI Switch, JD378A HP 5500-24G-PoE EI Switch, JD379A HP 5500-24G-SFP DC EI Switch, JG240A HP 5500-48G-PoE+ EI Switch with 2 Interface Slots, JG241A HP 5500-24G-PoE+ EI Switch with 2 Interface Slots, JG249A HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface, JG250A HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots, JG251A HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots, JG252A HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface Slots, JG253A HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface Slots CVE-2014-9295 4800G (Comware 5) R2221P08 JD007A HP 4800-24G Switch, JD008A HP 4800-24G-PoE Switch, JD009A HP 4800-24G-SFP Switch, JD010A HP 4800-48G Switch, JD011A HP 4800-48G-PoE Switch CVE-2014-9295 5500SI (Comware 5) R2221P08 JD369A HP 5500-24G SI Switch, JD370A HP 5500-48G SI Switch, JD371A HP 5500-24G-PoE SI Switch, JD372A HP 5500-48G-PoE SI Switch, JG238A HP 5500-24G-PoE+ SI Switch with 2 Interface Slots, JG239A HP 5500-48G-PoE+ SI Switch with 2 Interface Slots CVE-2014-9295 4500G (Comware 5) R2221P08 JF428A HP 4510-48G Switch, JF847A HP 4510-24G Switch CVE-2014-9295 5120 EI (Comware 5) R2221P08 JE066A HP 5120-24G EI Switch, JE067A HP 5120-48G EI Switch, JE068A HP 5120-24G EI Switch with 2 Interface Slots, JE069A HP 5120-48G EI Switch with 2 Interface Slots, JE070A HP 5120-24G-PoE EI 2-slot Switch, JE071A HP 5120-48G-PoE EI 2-slot Switch, JG236A HP 5120-24G-PoE+ EI Switch with 2 Interface Slots, JG237A HP 5120-48G-PoE+ EI Switch with 2 Interface Slots, JG245A HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots, JG246A HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots, JG247A HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots, JG248A HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots CVE-2014-9295 4210G (Comware 5) R2221P08 JF844A HP 4210-24G Switch, JF845A HP 4210-48G Switch, JF846A HP 4210-24G-PoE Switch CVE-2014-9295 5120 SI (Comware 5) R1513P95 JE072A HP 5120-48G SI Switch, JE073A HP 5120-16G SI Switch, JE074A HP 5120-24G SI Switch, JG091A HP 5120-24G-PoE+ (370W) SI Switch, JG092A HP 5120-24G-PoE+ (170W) SI Switch CVE-2014-9295 3610 (Comware 5) R5319P10 JD335A HP 3610-48 Switch, JD336A HP 3610-24-4G-SFP Switch, JD337A HP 3610-24-2G-2G-SFP Switch, JD338A HP 3610-24-SFP Switch CVE-2014-9295 3600V2 (Comware 5) R2110P03 JG299A HP 3600-24 v2 EI Switch, JG299B HP 3600-24 v2 EI Switch, JG300A HP 3600-48 v2 EI Switch, JG300B HP 3600-48 v2 EI Switch, JG301A HP 3600-24-PoE+ v2 EI Switch, JG301B HP 3600-24-PoE+ v2 EI Switch, JG301C HP 3600-24-PoE+ v2 EI Switch, JG302A HP 3600-48-PoE+ v2 EI Switch, JG302B HP 3600-48-PoE+ v2 EI Switch, JG302C HP 3600-48-PoE+ v2 EI Switch, JG303A HP 3600-24-SFP v2 EI Switch, JG303B HP 3600-24-SFP v2 EI Switch, JG304A HP 3600-24 v2 SI Switch, JG304B HP 3600-24 v2 SI Switch, JG305A HP 3600-48 v2 SI Switch, JG305B HP 3600-48 v2 SI Switch, JG306A HP 3600-24-PoE+ v2 SI Switch, JG306B HP 3600-24-PoE+ v2 SI Switch, JG306C HP 3600-24-PoE+ v2 SI Switch, JG307A HP 3600-48-PoE+ v2 SI Switch, JG307B HP 3600-48-PoE+ v2 SI Switch, JG307C HP 3600-48-PoE+ v2 SI Switch CVE-2014-9295 3100V2-48 (Comware 5) R2110P03 JG315A HP 3100-48 v2 Switch, JG315B HP 3100-48 v2 Switch CVE-2014-9295 3100V2 (Comware 5) R5203P11 JD313B HP 3100-24-PoE v2 EI Switch, JD318B HP 3100-8 v2 EI Switch, JD319B HP 3100-16 v2 EI Switch, JD320B HP 3100-24 v2 EI Switch, JG221A HP 3100-8 v2 SI Switch, JG222A HP 3100-16 v2 SI Switch, JG223A HP 3100-24 v2 SI Switch CVE-2014-9295 HP870 (Comware 5) R2607P35 JG723A HP 870 Unified Wired-WLAN Appliance, JG725A HP 870 Unified Wired-WLAN TAA-compliant Appliance CVE-2014-9295 HP850 (Comware 5) R2607P35 JG722A HP 850 Unified Wired-WLAN Appliance, JG724A HP 850 Unified Wired-WLAN TAA-compliant Appliance CVE-2014-9295 HP830 (Comware 5) R3507P35 JG640A HP 830 24-Port PoE+ Unified Wired-WLAN Switch, JG641A HP 830 8-port PoE+ Unified Wired-WLAN Switch, JG646A HP 830 24-Port PoE+ Unified Wired-WLAN TAA-compliant Switch, JG647A HP 830 8-Port PoE+ Unified Wired-WLAN TAA-compliant CVE-2014-9295 HP6000 (Comware 5) R2507P35 JG639A HP 10500/7500 20G Unified Wired-WLAN Module, JG645A HP 10500/7500 20G Unified Wired-WLAN TAA-compliant Module CVE-2014-9295 WX5004-EI (Comware 5) R2507P35 JD447B HP WX5002 Access Controller, JD448A HP WX5004 Access Controller, JD448B HP WX5004 Access Controller, JD469A HP WX5004 Access Controller CVE-2014-9295 SecBlade FW (Comware 5) R3181P05 JC635A HP 12500 VPN Firewall Module, JD245A HP 9500 VPN Firewall Module, JD249A HP 10500/7500 Advanced VPN Firewall Module, JD250A HP 6600 Firewall Processing Router Module, JD251A HP 8800 Firewall Processing Module, JD255A HP 5820 VPN Firewall Module CVE-2014-9295 F1000-E (Comware 5) R3181P05 JD272A HP F1000-E VPN Firewall Appliance CVE-2014-9295 F1000-A-EI (Comware 5) R3734P06 JG214A HP F1000-A-EI VPN Firewall Appliance CVE-2014-9295 F1000-S-EI (Comware 5) R3734P06 JG213A HP F1000-S-EI VPN Firewall Appliance CVE-2014-9295 F5000-A (Comware 5) F3210P23 JD259A HP A5000-A5 VPN Firewall Chassis, JG215A HP F5000 Firewall Main Processing Unit, JG216A HP F5000 Firewall Standalone Chassis CVE-2014-9295 U200S and CS (Comware 5) F5123P31 JD273A HP U200-S UTM Appliance CVE-2014-9295 U200A and M (Comware 5) F5123P31 JD275A HP U200-A UTM Appliance CVE-2014-9295 F5000-C/S (Comware 5) R3811P03 JG650A HP F5000-C VPN Firewall Appliance, JG370A HP F5000-S VPN Firewall Appliance CVE-2014-9295 SecBlade III (Comware 5) R3820P03 JG371A HP 12500 20Gbps VPN Firewall Module, JG372A HP 10500/11900/7500 20Gbps VPN Firewall Module CVE-2014-9295 MSR20 RU (Comware 5 Low Encryption SW) R2513L61 JD432A HP A-MSR20-21 Router, JD662A HP MSR20-20 Router, JD663A HP A-MSR20-21 Router, JD663B HP MSR20-21 Router, JD664A HP MSR20-40 Router, JF228A HP MSR20-40, JF283A HP MSR20-20 Router CVE-2014-9295 MSR20-1X RU (Comware 5 Low Encryption SW) R2513L61 JD431A HP MSR20-10 Router, JD667A HP A-MSR20-15 IW Multi-service Router, JD668A HP MSR20-13 Router, JD669A HP MSR20-13-W Router, JD670A HP A-MSR20-15 A Multi-service Router, JD671A HP A-MSR20-15 AW Multi-service Router, JD672A HP A-MSR20-15 I Multi-service Router, JD673A HP MSR20-11 Router, JD674A HP MSR20-12 Router, JD675A HP MSR20-12-W Router, JD676A HP MSR20-12-T Router, JF236A HP MSR20-15-I Router, JF237A HP MSR20-15-A Router, JF238A HP MSR20-15-I-W Router, JF239A HP MSR20-11 Router, JF240A HP MSR20-13 Router, JF241A HP MSR20-12 Router, JF806A HP MSR20-12-T Router, JF807A HP MSR20-12-W Router, JF808A HP MSR20-13-W Router, JF809A HP MSR20-15-A-W Router, JF817A HP MSR20-15 Router, JG209A HP MSR20-12-T-W Router, JG210A HP MSR20-13-W Router CVE-2014-9295 MSR30 RU (Comware 5 Low Encryption SW) R2513L61 JD654A HP MSR30-60 PoE Router, JD657A HP MSR30-40 Router, JD658A HP MSR30-60 Router, JD660A HP MSR30-20 PoE Router, JD661A HP MSR30-40 PoE Router, JD666A HP MSR30-20 Router, JF229A HP MSR30-40 Router, JF230A HP MSR30-60 Router, JF232A HP A-MSR30-40 (RT-MSR3040-AC-OVS-AS-H3) Multi-service Router, JF235A HP MSR30-20 DC Router, JF284A HP MSR30-20 Router, JF287A HP MSR30-40 DC Router, JF801A HP MSR30-60 DC Router, JF802A HP MSR30-20 PoE Router, JF803A HP MSR30-40 PoE Router, JF804A HP MSR30-60 PoE Router, JG728A HP MSR30-20 TAA-compliant DC Router, JG729A HP MSR30-20 TAA-compliant Router CVE-2014-9295 MSR301X RU (Comware 5 Low Encryption SW) R2513L61 JF800A HP MSR30-11 Router, JF816A HP MSR30-10 Router, JG182A HP MSR30-11E Router, JG183A HP MSR30-11F Router, JG184A HP MSR30-10 DC Router CVE-2014-9295 MSR316 RU (Comware 5 Low Encryption SW) R2513L61 JD659A HP MSR30-16 PoE Router, JD665A HP MSR30-16 Router, JF233A HP MSR30-16 Router, JF234A HP MSR30-16 PoE Router CVE-2014-9295 MSR50 RU (Comware 5 Low Encryption SW) R2513L61 JD433A HP MSR50-40 Router, JD653A HP MSR50 Processor Module, JD655A HP MSR 50-40 Router, JD656A HP MSR50-60 Router, JF231A HP MSR50-60 Router, JF285A HP MSR50-40 DC Router, JF640A HP MSR50-60 Router Chassis with DC Power Supply CVE-2014-9295 MSR50 EPU RU (Comware 5 Low Encryption SW) R2513L61 JD429A HP MSR50 G2 Processor Module, JD429B HP MSR50 G2 Processor Module, JD433A HP MSR50-40 Router, JD655A HP MSR 50-40 Router, JD656A HP MSR50-60 Router, JF231A HP MSR50-60 Router, JF285A HP MSR50-40 DC Router, JF640A HP MSR50-60 Router Chassis with DC Power Supply CVE-2014-9295 MSR1000 RU (Comware 5 Low Encryption SW) R2513L61 JG732A HP MSR1003-8 AC Router CVE-2014-9295 6600 RSE RU (Comware 5 Low Encryption SW) R3303P18 JC566A HP 6600 RSE-X1 Router Main Processing Unit, JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit CVE-2014-9295 6600 RPE RU (Comware 5 Low Encryption SW) R3303P18 JC165A) HP 6600 RPE-X1 Router Module, JG781A) HP 6600 RPE-X1 TAA-compliant Main Processing Unit CVE-2014-9295 6602 RU (Comware 5 Low Encryption SW) R3303P18 JC176A) HP 6602 Router Chassis CVE-2014-9295 HSR6602 RU (Comware 5 Low Encryption SW) R3303P18 JC177A HP 6608 Router, JC177B HP 6608 Router Chassis, JC178A HP 6604 Router Chassis, JC178B HP 6604 Router Chassis, JC496A HP 6616 Router Chassis, JG353A HP HSR6602-G Router, JG354A HP HSR6602-XG Router, JG355A HP 6600 MCP-X1 Router Main Processing Unit, JG356A HP 6600 MCP-X2 Router Main Processing Unit, JG776A HP HSR6602-G TAA-compliant Router, JG777A HP HSR6602-XG TAA-compliant Router, JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit CVE-2014-9295 HSR6800 RU (Comware 5 Low Encryption SW) R3303P18 JG361A HP HSR6802 Router Chassis, JG362A HP HSR6804 Router Chassis, JG363A HP HSR6808 Router Chassis, JG364A HP HSR6800 RSE-X2 Router Main Processing Unit, JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit CVE-2014-9295 SMB1910 (Comware 5) R1108 JG540A HP 1910-48 Switch, JG539A HP 1910-24-PoE+ Switch, JG538A HP 1910-24 Switch, JG537A HP 1910-8 -PoE+ Switch, JG536A HP 1910-8 Switch CVE-2014-9295 SMB1920 (Comware 5) R1106 JG928A HP 1920-48G-PoE+ (370W) Switch, JG927A HP 1920-48G Switch, JG926A HP 1920-24G-PoE+ (370W) Switch, JG925A HP 1920-24G-PoE+ (180W) Switch, JG924A HP 1920-24G Switch, JG923A HP 1920-16G Switch, JG922A HP 1920-8G-PoE+ (180W) Switch, JG921A HP 1920-8G-PoE+ (65W) Switch, JG920A HP 1920-8G Switch CVE-2014-9295 V1910 (Comware 5) R1513P95 JE005A HP 1910-16G Switch, JE006A HP 1910-24G Switch, JE007A HP 1910-24G-PoE (365W) Switch, JE008A HP 1910-24G-PoE(170W) Switch, JE009A HP 1910-48G Switch, JG348A HP 1910-8G Switch, JG349A HP 1910-8G-PoE+ (65W) Switch, JG350A HP 1910-8G-PoE+ (180W) Switch CVE-2014-9295 SMB 1620 (Comware 5) R1105 JG914A HP 1620-48G Switch, JG913A HP 1620-24G Switch, JG912A HP 1620-8G Switch CVE-2014-9295 COMWARE 7 Products 12500 (Comware 7) R7328P04 JC085A HP A12518 Switch Chassis, JC086A HP A12508 Switch Chassis, JC652A HP 12508 DC Switch Chassis, JC653A HP 12518 DC Switch Chassis, JC654A HP 12504 AC Switch Chassis, JC655A HP 12504 DC Switch Chassis, JF430A HP A12518 Switch Chassis, JF430B HP 12518 Switch Chassis, JF430C HP 12518 AC Switch Chassis, JF431A HP A12508 Switch Chassis, JF431B HP 12508 Switch Chassis, JF431C HP 12508 AC Switch Chassis, JC072B HP 12500 Main Processing Unit, JG497A HP 12500 MPU w/Comware V7 OS, JG782A HP FF 12508E AC Switch Chassis, JG783A HP FF 12508E DC Switch Chassis, JG784A HP FF 12518E AC Switch Chassis, JG785A HP FF 12518E DC Switch Chassis, JG802A HP FF 12500E MPU, JG836A HP FlexFabric 12518E AC Switch TAA-compliant Chassis, JG834A HP FlexFabric 12508E AC Switch TAA-compliant Chassis, JG835A HP FlexFabric 12508E DC Switch TAA-compliant Chassis, JG837A HP FlexFabric 12518E DC Switch TAA-compliant Chassis, JG803A HP FlexFabric 12500E TAA-compliant Main Processing Unit, JG796A HP FlexFabric 12500 48-port 10GbE SFP+ FD Module, JG790A HP FlexFabric 12500 16-port 40GbE QSFP+ FD Module, JG794A HP FlexFabric 12500 40-port 10GbE SFP+ FG Module, JG792A HP FlexFabric 12500 40-port 10GbE SFP+ FD Module, JG788A HP FlexFabric 12500 4-port 100GbE CFP FG Module, JG786A HP FlexFabric 12500 4-port 100GbE CFP FD Module, JG797A HP FlexFabric 12500 48-port 10GbE SFP+ FD TAA-compliant Module, JG791A HP FlexFabric 12500 16-port 40GbE QSFP+ FD TAA-compliant Module, JG795A HP FlexFabric 12500 40-port 10GbE SFP+ FG TAA-compliant Module, JG793A HP FlexFabric 12500 40-port 10GbE SFP+ FD TAA-compliant Module, JG789A HP FlexFabric 12500 4-port 100GbE CFP FG TAA-compliant Module, JG787A HP FlexFabric 12500 4-port 100GbE CFP FD TAA-compliant Module, JG798A HP FlexFabric 12508E Fabric Module H3C S12508 Routing Switch (AC-1) (0235A0GE), H3C S12518 Routing Switch (AC-1) (0235A0GF), H3C S12508 Chassis (0235A0E6), H3C S12508 Chassis (0235A38N), H3C S12518 Chassis (0235A0E7), H3C S12518 Chassis (0235A38M), H3C 12508 DC Switch Chassis (0235A38L), H3C 12518 DC Switch Chassis (0235A38K) CVE-2014-9295 11900 (Comware 7) R7169P01 JG608A HP FF 11908-V Switch Chassis, JG609A HP FF 11900 Main Processing Unit, JG610A HP FF 11908 1.92Tbps Type D Fabric Module, JG611A HP FF 11900 32p 10GbE SFP+ SF Module, JG612A HP FF 11900 48p 10GbE SFP+ SF Module, JG613A HP FF 11900 4p 40GbE QSFP+ SF Module, JG614A HP FF 11900 8p 40GbE QSFP+ SF Module, JG615A HP FF 11900 24-p 1/10GBASE-T SF Module, JG616A HP FF 11900 2500W AC Power Supply, JG617A HP FF 11900 2400W DC Power Supply, JG618A HP FF 11908-V Spare Fan Assy, JG918A HP FF 11900 2p 100GbE CFP SE Module CVE-2014-9295 10500 (Comware 7) R7150 JC611A HP 10508-V Switch Chassis, JC612A HP 10508 Switch Chassis, JC613A HP 10504 Switch Chassis, JC748A HP 10512 Switch Chassis, JG820A HP 10504 TAA Switch Chassis, JG821A HP 10508 TAA Switch Chassis, JG822A HP 10508-V TAA Switch Chassis, JG823A HP 10512 TAA Switch Chassis, JG496A HP 10500 Type A MPU w/Comware v7 OS, JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System, JH191A HP 10500 44-port GbE(SFP,LC)/ 4-port 10GbE SFP+ (SFP+,LC) SE Module, JH192A HP 10500 48-port Gig-TRJ45SE Module, JH193A HP 10500 16-port 10GbE SFP+ (SFP+,LC) SF Module, JH194A HP 10500 24-port 10GbE SFP+ (SFP+,LC) EC Module, JH195A HP 10500 6-port 40GbE QSFP+ EC Module, JH196A HP 10500 2-port 100GbE CFP EC Module, JH197A HP 10500 48-port 10GbE SFP+ (SFP+,LC) SG Module N/A CVE-2014-9295 12900 (Comware 7) R1112 JG619A HP FlexFabric 12910 Switch AC Chassis, JG621A HP FlexFabric 12910 Main Processing Unit, JG632A HP FlexFabric 12916 Switch AC Chassis, JG634A HP FlexFabric 12916 Main Processing Unit CVE-2014-9295 5900 (Comware 7) R2311P06 JC772A HP 5900AF-48XG-4QSFP+ Switch, JG336A HP 5900AF-48XGT-4QSFP+ Switch, JG510A HP 5900AF-48G-4XG-2QSFP+ Switch, JG554A HP 5900AF-48XG-4QSFP+ TAA Switch, JG838A HP FF 5900CP-48XG-4QSFP+ Switch, JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant, JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch, JH038A) HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant CVE-2014-9295 5920 (Comware 7) R2311P06 JG296A HP 5920AF-24XG Switch, JG555A HP 5920AF-24XG TAA Switch CVE-2014-9295 MSR1000 (Comware 7) R0106P31 JG875A HP MSR1002-4 AC Router, JH060A HP MSR1003-8S AC Router CVE-2014-9295 MSR2000 (Comware 7) R0106P31 JG411A HP MSR2003 AC Router, JG734A HP MSR2004-24 AC Router, JG735A) HP MSR2004-48 Router, JG866A HP MSR2003 TAA-compliant AC Router CVE-2014-9295 MSR3000 (Comware 7) R0106P31 JG404A HP MSR3064 Router, JG405A HP MSR3044 Router, JG406A HP MSR3024 AC Router, JG407A HP MSR3024 DC Router, JG408A HP MSR3024 PoE Router, JG409A HP MSR3012 AC Router, JG410A HP MSR3012 DC Router, JG861A HP MSR3024 TAA-compliant AC Router CVE-2014-9295 MSR4000 (Comware 7) R0106P31 JG402A HP MSR4080 Router Chassis, JG403A HP MSR4060 Router Chassis, JG412A HP MSR4000 MPU-100 Main Processing Unit, JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit CVE-2014-9295 5800 (Comware 7) R7006P12 JC099A HP 5800-24G-PoE Switch, JC099B HP 5800-24G-PoE+ Switch, JC100A HP 5800-24G Switch, JC100B HP 5800-24G Switch, JC101A HP 5800-48G Switch with 2 Slots, JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots, JC103A HP 5800-24G-SFP Switch, JC103B HP 5800-24G-SFP Switch with 1 Interface Slot, JC104A HP 5800-48G-PoE Switch, JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot, JC105A HP 5800-48G Switch, JC105B HP 5800-48G Switch with 1 Interface Slot, JG254A HP 5800-24G-PoE+ TAA-compliant Switch, JG254B HP 5800-24G-PoE+ TAA-compliant Switch, JG255A HP 5800-24G TAA-compliant Switch, JG255B HP 5800-24G TAA-compliant Switch, JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot, JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot, JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot, JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot, JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot, JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot, JG225A HP 5800AF-48G Switch, JG225B HP 5800AF-48G Switch, JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots, JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots, JG243A HP 5820-24XG-SFP+ TAA-compliant Switch, JG243B HP 5820-24XG-SFP+ TAA-compliant Switch, JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots & 1 OAA Slot, JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots and 1 OAA Slot, JC106A HP 5820-14XG-SFP+ Switch with 2 Slots, JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot, JG219A HP 5820AF-24XG Switch, JG219B HP 5820AF-24XG Switch, JC102A HP 5820-24XG-SFP+ Switch, JC102B HP 5820-24XG-SFP+ Switch CVE-2014-9295 VSR (Comware 7) R0204P01 JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software, JG811AAE HP VSR1001 Comware 7 Virtual Services Router, JG812AAE HP VSR1004 Comware 7 Virtual Services Router, JG813AAE HP VSR1008 Comware 7 Virtual Services Router CVE-2014-9295 7900 (Comware 7) R2122 JG682A HP FlexFabric 7904 Switch Chassis, JG841A HP FlexFabric 7910 Switch Chassis, JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit, JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit CVE-2014-9295 5130 (Comware 7) R3108P03 JG932A HP 5130-24G-4SFP+ EI Switch, JG933A HP 5130-24G-SFP-4SFP+ EI Switch, JG934A HP 5130-48G-4SFP+ EI Switch, JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch, JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch, JG975A HP 5130-24G-4SFP+ EI Brazil Switch, JG976A HP 5130-48G-4SFP+ EI Brazil Switch, JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch, JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch CVE-2014-9295 5700 (Comware 7) R2311P06 JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch, JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch, JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch, JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch, JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch, JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch CVE-2014-9295 VCX 9.8.17 J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr, J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr, JC517A HP VCX V7205 Platform w/DL 360 G6 Server, JE355A HP VCX V6000 Branch Platform 9.0, JC516A HP VCX V7005 Platform w/DL 120 G6 Server, JC518A HP VCX Connect 200 Primry 120 G6 Server, J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr, JE341A HP VCX Connect 100 Secondary, JE252A HP VCX Connect Primary MIM Module, JE253A HP VCX Connect Secondary MIM Module, JE254A HP VCX Branch MIM Module, JE355A HP VCX V6000 Branch Platform 9.0, JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod, JD023A HP MSR30-40 Router with VCX MIM Module, JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM, JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod, JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod, JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod, JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS, JE340A HP VCX Connect 100 Pri Server 9.0, JE342A HP VCX Connect 100 Sec Server 9.0 CVE -2014-9293 CVE-2014-9294 CVE-2014-9295 HISTORY Version:1 (rev.1) - 9 December 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2015 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. 6.5) - i386, noarch, ppc64, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: ntp security update Advisory ID: RHSA-2014:2024-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-2024.html Issue date: 2014-12-20 CVE Names: CVE-2014-9293 CVE-2014-9294 CVE-2014-9295 CVE-2014-9296 ===================================================================== 1. Summary: Updated ntp packages that fix several security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Multiple buffer overflow flaws were discovered in ntpd's crypto_recv(), ctl_putdata(), and configure() functions. A remote attacker could use either of these flaws to send a specially crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the ntp user. Note: the crypto_recv() flaw requires non-default configurations to be active, while the ctl_putdata() flaw, by default, can only be exploited via local attackers, and the configure() flaw requires additional authentication to exploit. (CVE-2014-9293) It was found that ntp-keygen used a weak method for generating MD5 keys. Note: it is recommended to regenerate any MD5 keys that had explicitly been generated with ntp-keygen; the default installation does not contain such keys). (CVE-2014-9294) A missing return statement in the receive() function could potentially allow a remote attacker to bypass NTP's authentication mechanism. (CVE-2014-9296) All ntp users are advised to upgrade to this updated package, which contains backported patches to resolve these issues. After installing the update, the ntpd daemon will restart automatically. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1176032 - CVE-2014-9293 ntp: automatic generation of weak default key in config_auth() 1176035 - CVE-2014-9294 ntp: ntp-keygen uses weak random number generator and seed when generating MD5 keys 1176037 - CVE-2014-9295 ntp: Multiple buffer overflows via specially-crafted packets 1176040 - CVE-2014-9296 ntp: receive() missing return on error 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ntp-4.2.6p5-2.el6_6.src.rpm i386: ntp-4.2.6p5-2.el6_6.i686.rpm ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm ntpdate-4.2.6p5-2.el6_6.i686.rpm x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm ntpdate-4.2.6p5-2.el6_6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm ntp-perl-4.2.6p5-2.el6_6.i686.rpm noarch: ntp-doc-4.2.6p5-2.el6_6.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ntp-4.2.6p5-2.el6_6.src.rpm x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm ntpdate-4.2.6p5-2.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): noarch: ntp-doc-4.2.6p5-2.el6_6.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ntp-4.2.6p5-2.el6_6.src.rpm i386: ntp-4.2.6p5-2.el6_6.i686.rpm ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm ntpdate-4.2.6p5-2.el6_6.i686.rpm ppc64: ntp-4.2.6p5-2.el6_6.ppc64.rpm ntp-debuginfo-4.2.6p5-2.el6_6.ppc64.rpm ntpdate-4.2.6p5-2.el6_6.ppc64.rpm s390x: ntp-4.2.6p5-2.el6_6.s390x.rpm ntp-debuginfo-4.2.6p5-2.el6_6.s390x.rpm ntpdate-4.2.6p5-2.el6_6.s390x.rpm x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm ntpdate-4.2.6p5-2.el6_6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm ntp-perl-4.2.6p5-2.el6_6.i686.rpm noarch: ntp-doc-4.2.6p5-2.el6_6.noarch.rpm ppc64: ntp-debuginfo-4.2.6p5-2.el6_6.ppc64.rpm ntp-perl-4.2.6p5-2.el6_6.ppc64.rpm s390x: ntp-debuginfo-4.2.6p5-2.el6_6.s390x.rpm ntp-perl-4.2.6p5-2.el6_6.s390x.rpm x86_64: ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ntp-4.2.6p5-2.el6_6.src.rpm i386: ntp-4.2.6p5-2.el6_6.i686.rpm ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm ntpdate-4.2.6p5-2.el6_6.i686.rpm x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm ntpdate-4.2.6p5-2.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm ntp-perl-4.2.6p5-2.el6_6.i686.rpm noarch: ntp-doc-4.2.6p5-2.el6_6.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: ntp-4.2.6p5-19.el7_0.src.rpm x86_64: ntp-4.2.6p5-19.el7_0.x86_64.rpm ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm ntpdate-4.2.6p5-19.el7_0.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: ntp-doc-4.2.6p5-19.el7_0.noarch.rpm ntp-perl-4.2.6p5-19.el7_0.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm sntp-4.2.6p5-19.el7_0.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: ntp-4.2.6p5-19.el7_0.src.rpm x86_64: ntp-4.2.6p5-19.el7_0.x86_64.rpm ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm ntpdate-4.2.6p5-19.el7_0.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: ntp-doc-4.2.6p5-19.el7_0.noarch.rpm ntp-perl-4.2.6p5-19.el7_0.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm sntp-4.2.6p5-19.el7_0.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: ntp-4.2.6p5-19.el7_0.src.rpm ppc64: ntp-4.2.6p5-19.el7_0.ppc64.rpm ntp-debuginfo-4.2.6p5-19.el7_0.ppc64.rpm ntpdate-4.2.6p5-19.el7_0.ppc64.rpm s390x: ntp-4.2.6p5-19.el7_0.s390x.rpm ntp-debuginfo-4.2.6p5-19.el7_0.s390x.rpm ntpdate-4.2.6p5-19.el7_0.s390x.rpm x86_64: ntp-4.2.6p5-19.el7_0.x86_64.rpm ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm ntpdate-4.2.6p5-19.el7_0.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: ntp-doc-4.2.6p5-19.el7_0.noarch.rpm ntp-perl-4.2.6p5-19.el7_0.noarch.rpm ppc64: ntp-debuginfo-4.2.6p5-19.el7_0.ppc64.rpm sntp-4.2.6p5-19.el7_0.ppc64.rpm s390x: ntp-debuginfo-4.2.6p5-19.el7_0.s390x.rpm sntp-4.2.6p5-19.el7_0.s390x.rpm x86_64: ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm sntp-4.2.6p5-19.el7_0.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: ntp-4.2.6p5-19.el7_0.src.rpm x86_64: ntp-4.2.6p5-19.el7_0.x86_64.rpm ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm ntpdate-4.2.6p5-19.el7_0.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: ntp-doc-4.2.6p5-19.el7_0.noarch.rpm ntp-perl-4.2.6p5-19.el7_0.noarch.rpm x86_64: ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm sntp-4.2.6p5-19.el7_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-9293 https://access.redhat.com/security/cve/CVE-2014-9294 https://access.redhat.com/security/cve/CVE-2014-9295 https://access.redhat.com/security/cve/CVE-2014-9296 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFUlOKcXlSAg2UNWIIRAvBoAKCfw+j4ua5JaIRMc5eKkny9G1yWlgCgufNc EvBImTd+Vq7//UExow1FP4U= =m/Eb -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities EMC Identifier: ESA-2015-004 CVE Identifier: CVE-2015-0513, CVE-2015-0514, CVE-2015-0515, CVE-2015-0516, CVE-2014-4288, CVE-2014-6456, CVE-2014-6457, CVE-2014-6458, CVE-2014-6466, CVE-2014-6468, CVE-2014-6476, CVE-2014-6485, CVE-2014-6492, CVE-2014-6493, CVE-2014-6502, CVE-2014-6503, CVE-2014-6504, CVE-2014-6506, CVE-2014-6511, CVE-2014-6512, CVE-2014-6513, CVE-2014-6515, CVE-2014-6517, CVE-2014-6519, CVE-2014-6527, CVE-2014-6531, CVE-2014-6532, CVE-2014-6558, CVE-2014-6562, CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296, CVE-2014-3618 Severity Rating: CVSS v2 Base Score: View details below for individual CVSS score for each CVE Affected products: \x95 EMC M&R (Watch4Net) versions prior 6.5u1 \x95 EMC ViPR SRM versions prior to 3.6.1 Summary: EMC M&R (Watch4Net) is vulnerable to multiple security vulnerabilities that could be potentially exploited by malicious users to compromise the affected system. EMC ViPR SRM is built on EMC M&R platform and is also affected by these vulnerabilities. Details: The vulnerabilities include: \x95 Multiple Oracle Java Runtime Environment (JRE) Vulnerabilities CVE Identifiers: CVE-2014-4288, CVE-2014-6456, CVE-2014-6457, CVE-2014-6458, CVE-2014-6466, CVE-2014-6468, CVE-2014-6476, CVE-2014-6485, CVE-2014-6492, CVE-2014-6493, CVE-2014-6502, CVE-2014-6503, CVE-2014-6504, CVE-2014-6506, CVE-2014-6511, CVE-2014-6512, CVE-2014-6513, CVE-2014-6515, CVE-2014-6517, CVE-2014-6519, CVE-2014-6527, CVE-2014-6531, CVE-2014-6532, CVE-2014-6558, CVE-2014-6562. Oracle JRE contains multiple security vulnerabilities. Oracle JRE has been upgraded to 8.0u25 to address these vulnerabilities. See vendor advisory (http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html#AppendixJAVA) for more details. CVSS v2 Base Score: Please refer to http://nvd.nist.gov/ for the individual CVSS scores for each CVE listed above. \x95 Multiple Cross-Site Scripting Vulnerabilities CVE Identifier: CVE-2015-0513 Several user-supplied fields in the administrative user interface may be potentially exploited by an authenticated privileged malicious user to conduct cross-site-scripting attacks on other authenticated users of the system. CVSS v2 Base Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P) \x95 Insecure Cryptographic Storage Vulnerability CVE Identifier: CVE-2015-0514 A malicious non-ViPR SRM user with access to an installation of ViPR SRM and knowledge of internal encryption methods could potentially decrypt credentials used for data center discovery. CVSS v2 Base Score: 5.7 (AV:A/AC:M/Au:N/C:C/I:N/A:N) \x95 Unrestricted File Upload Vulnerability CVE Identifier: CVE-2015-0515 This vulnerability may potentially be exploited by an authenticated, privileged malicious user to upload arbitrary files into the file system via the web interface. CVSS v2 Base Score: 6 (AV:N/AC:M/Au:S/C:P/I:P/A:P) \x95 Path Traversal Vulnerability CVE Identifier: CVE-2015-0516 This vulnerability may potentially be exploited by an authenticated, privileged malicious user to download arbitrary files from the file system via the web interface by manipulating the directory structure in the URL. CVSS v2 Base Score: 6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N) \x95 SUSE Procmail Heap Overflow Vulnerability CVE Identifier: CVE-2014-3618 Procmail was updated to fix a heap-overflow in procmail's formail utility when processing specially-crafted email headers. CVSS v2 Base Score: Please refer to http://nvd.nist.gov/ for the CVSS score. \x95 NTP Multiple Vulnerabilities CVE Identifier: CVE-2014-9293 CVE-2014-9294 CVE-2014-9295 CVE-2014-9296 NTP was updated to fix multiple vulnerabilities. See vendor advisory http://support.ntp.org/bin/view/Main/SecurityNotice for more details. CVSS v2 Base Score: Please refer to http://nvd.nist.gov/ for the CVSS scores. Resolution: The following version contains the resolution to these issues: \x95 EMC M&R (Watch4Net) 6.5u1 and later \x95 EMC ViPR SRM 3.6.1 and later EMC strongly recommends all customers upgrade at the earliest opportunity. In addition, customers are recommended to review the Security Configuration Guide distributed with the product for specific instructions on secure configurations of the system. Link to remedies: Registered customers can download upgraded software from support.emc.com at https://support.emc.com/downloads/34247_ViPR-SRM Credits: EMC would like to thank Han Sahin of Securify B.V. (han.sahin@securify.nl) for reporting CVE-2015-0513 and CVE-2015-0514. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-34 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: NTP: Multiple vulnerabilities Date: December 24, 2014 Bugs: #533076 ID: 201412-34 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in NTP, the worst of which could result in remote execution of arbitrary code. The net-misc/ntp package contains the official reference implementation by the NTP Project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/ntp < 4.2.8 >= 4.2.8 Description =========== Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details. Resolution ========== All NTP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.8" References ========== [ 1 ] CVE-2014-9293 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9293 [ 2 ] CVE-2014-9294 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9294 [ 3 ] CVE-2014-9295 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9295 [ 4 ] CVE-2014-9296 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9296 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201412-34.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 3.78

sources: NVD: CVE-2014-9293 // CERT/CC: VU#852879 // JVNDB: JVNDB-2014-007350 // BID: 71757 // BID: 71762 // BID: 71758 // PACKETSTORM: 129716 // PACKETSTORM: 129793 // PACKETSTORM: 134756 // PACKETSTORM: 130140 // PACKETSTORM: 129686 // PACKETSTORM: 130031 // PACKETSTORM: 129723

AFFECTED PRODUCTS

vendor:ciscomodel:paging serverscope:eqversion:0

Trust: 1.8

vendor:ciscomodel:download serverscope:eqversion:0

Trust: 1.8

vendor:ciscomodel:edge digital media playerscope:eqversion:3000

Trust: 1.5

vendor:ntpmodel:ntpscope:lteversion:4.2.7

Trust: 1.0

vendor:ubuntumodel:linuxscope:eqversion:14.10

Trust: 0.9

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.9

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.9

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.9

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.9

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.9

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.9

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.9

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.9

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.9

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.9

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.9

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.9

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.9

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:7

Trust: 0.9

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.9

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.9

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.9

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:7

Trust: 0.9

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.9

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.9

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.9

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.9

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.9

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.9

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.9

vendor:redhatmodel:enterprise linux computenode optionalscope:eqversion:7

Trust: 0.9

vendor:redhatmodel:enterprise linux computenodescope:eqversion:7

Trust: 0.9

vendor:redhatmodel:enterprise linux client optionalscope:eqversion:7

Trust: 0.9

vendor:redhatmodel:enterprise linux clientscope:eqversion:7

Trust: 0.9

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.9

vendor:oraclemodel:communications policy managementscope:eqversion:12.1.1

Trust: 0.9

vendor:oraclemodel:communications policy managementscope:eqversion:10.4.1

Trust: 0.9

vendor:oraclemodel:communications policy managementscope:eqversion:9.9.1

Trust: 0.9

vendor:oraclemodel:communications policy managementscope:eqversion:9.7.3

Trust: 0.9

vendor:meinbergmodel:network time protocol 4.2.7p10scope: - version: -

Trust: 0.9

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.7

Trust: 0.9

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.6

Trust: 0.9

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.5

Trust: 0.9

vendor:meinbergmodel:network time protocol 4.2.4p8@lennon-o-lpvscope: - version: -

Trust: 0.9

vendor:meinbergmodel:network time protocol 4.2.4p7@copenhagen-oscope: - version: -

Trust: 0.9

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.4

Trust: 0.9

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.2

Trust: 0.9

vendor:meinbergmodel:network time protocolscope:eqversion:4.2.0

Trust: 0.9

vendor:meinbergmodel:network time protocolscope:eqversion:4.1.0

Trust: 0.9

vendor:meinbergmodel:network time protocolscope:eqversion:4.0

Trust: 0.9

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.9

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.9

vendor:junipermodel:vgwscope:eqversion:0

Trust: 0.9

vendor:junipermodel:nsmexpressscope:eqversion: -

Trust: 0.9

vendor:junipermodel:nsm server softwarescope:eqversion:0

Trust: 0.9

vendor:junipermodel:nsm series appliancesscope:eqversion:0

Trust: 0.9

vendor:junipermodel:nsmscope:eqversion:0

Trust: 0.9

vendor:junipermodel:junos spacescope:eqversion:0

Trust: 0.9

vendor:junipermodel:junos os 14.2r1scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 14.1r2-s2scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 14.1r2scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 14.1r1scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.3r4scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.3r3-s2scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.3r3scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.3r2-s3scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.3r1scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.2x51-d25scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.2r5-s1scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.2r5scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.1x50-d30scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.1r4-s3scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 13.1r4-s2scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.3r8scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.3r7scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.2x50-d70scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.2r9scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.1x47-d15scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.1x47-d10scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.1x46-d25scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.1x46-d20scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 12.1x44-d40scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 11.4r12-s4scope: - version: -

Trust: 0.9

vendor:junipermodel:junos os 11.4r12-s1scope: - version: -

Trust: 0.9

vendor:junipermodel:junos osscope:eqversion:0

Trust: 0.9

vendor:intelmodel:xeon phi 7120pscope: - version: -

Trust: 0.9

vendor:intelmodel:xeon phi 7120ascope: - version: -

Trust: 0.9

vendor:intelmodel:xeon phi 5110pscope: - version: -

Trust: 0.9

vendor:intelmodel:xeon phi 3120ascope: - version: -

Trust: 0.9

vendor:intelmodel:manycore platform software stackscope:eqversion:3.4

Trust: 0.9

vendor:intelmodel:manycore platform software stackscope:eqversion:3.3

Trust: 0.9

vendor:intelmodel:manycore platform software stackscope:eqversion:3.2

Trust: 0.9

vendor:intelmodel:manycore platform software stackscope:eqversion:3.1

Trust: 0.9

vendor:intelmodel:manycore platform software stackscope:eqversion:2.1

Trust: 0.9

vendor:ibmmodel:smartcloud entry fpscope:eqversion:3.19

Trust: 0.9

vendor:ibmmodel:smartcloud entryscope:eqversion:3.1

Trust: 0.9

vendor:ibmmodel:smart analytics systemscope:eqversion:77100

Trust: 0.9

vendor:ibmmodel:smart analytics systemscope:eqversion:77000

Trust: 0.9

vendor:ibmmodel:smart analytics systemscope:eqversion:76000

Trust: 0.9

vendor:ibmmodel:security network protectionscope:eqversion:71005.3

Trust: 0.9

vendor:ibmmodel:security network protectionscope:eqversion:71005.2

Trust: 0.9

vendor:ibmmodel:security network protectionscope:eqversion:51005.3

Trust: 0.9

vendor:ibmmodel:security network protectionscope:eqversion:51005.2

Trust: 0.9

vendor:ibmmodel:security network protectionscope:eqversion:41005.3

Trust: 0.9

vendor:ibmmodel:security network protectionscope:eqversion:41005.2

Trust: 0.9

vendor:ibmmodel:security network protectionscope:eqversion:31005.3

Trust: 0.9

vendor:ibmmodel:security network protectionscope:eqversion:31005.2

Trust: 0.9

vendor:ibmmodel:pureflexscope:eqversion:x3950x6

Trust: 0.9

vendor:ibmmodel:pureflexscope:eqversion:x3850x6

Trust: 0.9

vendor:ibmmodel:pureflex x240m5+penscope: - version: -

Trust: 0.9

vendor:ibmmodel:pureflex x240m4scope: - version: -

Trust: 0.9

vendor:ibmmodel:pureflex x220m4scope: - version: -

Trust: 0.9

vendor:ibmmodel:puredata system for operational analyticsscope:eqversion:1.1

Trust: 0.9

vendor:ibmmodel:puredata system for operational analyticsscope:eqversion:1.0

Trust: 0.9

vendor:ibmmodel:power hmcscope:eqversion:8.8.2.0

Trust: 0.9

vendor:ibmmodel:power hmcscope:eqversion:8.8.1.0

Trust: 0.9

vendor:ibmmodel:power hmcscope:eqversion:7.7.9.0

Trust: 0.9

vendor:ibmmodel:power hmcscope:eqversion:7.7.8.0

Trust: 0.9

vendor:ibmmodel:power hmcscope:eqversion:7.7.7.0

Trust: 0.9

vendor:ibmmodel:power hmcscope:eqversion:7.7.3.0

Trust: 0.9

vendor:ibmmodel:nextscale nx360m5scope: - version: -

Trust: 0.9

vendor:ibmmodel:nextscale nx360m4scope: - version: -

Trust: 0.9

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.3

Trust: 0.9

vendor:ibmmodel:netezza host managementscope:eqversion:5.3.2.0

Trust: 0.9

vendor:ibmmodel:idataplex dx360m4scope: - version: -

Trust: 0.9

vendor:huaweimodel:rack v100r001c00scope:eqversion:x8000

Trust: 0.9

vendor:huaweimodel:v1300n v100r002c02scope: - version: -

Trust: 0.9

vendor:huaweimodel:tecal xh621 v100r001c00b010scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:tecal xh320 v100r001c00spc105scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:tecal xh311 v100r001c00spc100scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:tecal xh310 v100r001c00spc100scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:rh5885h v100r003c00scope:eqversion:v3

Trust: 0.9

vendor:huaweimodel:rh5885 v100r003c01scope:eqversion:v3

Trust: 0.9

vendor:huaweimodel:rh5885 v100r001c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:rh2485 v100r002c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:rh2288h v100r002c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:rh2288e v100r002c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:rh2288 v100r002c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:rh2285h v100r002c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:rh2285 v100r002c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:rh1288 v100r002c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:oceanstor uds v100r002c01scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor uds v100r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor s6800t v200r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor s5800t v200r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor s5600t v100r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor s5500t v200r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor s2600t v200r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor hvs88t v100r001c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor hvs85t v100r001c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor 18800f v100r001c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:oceanstor v100r001c00scope:eqversion:18800

Trust: 0.9

vendor:huaweimodel:high-density server dh628 v100r001c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:high-density server dh621 v100r001c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:high-density server dh620 v100r001c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:high-density server dh320 v100r001c00scope:eqversion:v2

Trust: 0.9

vendor:huaweimodel:fusionsphere openstack v100r005c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusioncube v100r002c02spc300scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusioncube v100r002c02spc200scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusioncube v100r002c02spc100scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusioncube v100r002c01spc100scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusioncompute v100r005c10scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusioncompute v100r005c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusioncompute v100r003c10scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusioncompute v100r003c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusionaccess v100r005c20scope: - version: -

Trust: 0.9

vendor:huaweimodel:fusionaccess v100r005c10scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace vtm v100r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace vtm v100r001c30scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace vtm v100r001c02scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace vcn3000 v100r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace usm v200r003c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace uc v200r003c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace uc v200r002c01scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace uc v100r002c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace u2980 v200r003c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace u2980 v100r001c02spc200scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace u2980 v100r001c01scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace ivs v100r001c02scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace dcm v100r002c01scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace dcm v100r001c03scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace dcm v100r001c02scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace dcm v100r001c01scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace cc v200r001c50scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace cc v200r001c32scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace cc v200r001c31scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace cc v200r001c03scope: - version: -

Trust: 0.9

vendor:huaweimodel:espace cad v100r001c01lhue01scope: - version: -

Trust: 0.9

vendor:huaweimodel:esight uc&c v100r001c20scope: - version: -

Trust: 0.9

vendor:huaweimodel:esight uc&c v100r001c01scope: - version: -

Trust: 0.9

vendor:huaweimodel:esight network v200r005c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:esight network v200r003c10scope: - version: -

Trust: 0.9

vendor:huaweimodel:esight network v200r003c01scope: - version: -

Trust: 0.9

vendor:huaweimodel:e9000 chassis v100r001c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:e6000 chassis v100r001c00scope: - version: -

Trust: 0.9

vendor:huaweimodel:dc v100r002c01spc001scope: - version: -

Trust: 0.9

vendor:hpmodel:virtualization performance viewerscope:eqversion:2.10

Trust: 0.9

vendor:hpmodel:virtualization performance viewerscope:eqversion:2.01

Trust: 0.9

vendor:hpmodel:virtualization performance viewerscope:eqversion:2.0

Trust: 0.9

vendor:hpmodel:virtualization performance viewerscope:eqversion:1.2

Trust: 0.9

vendor:hpmodel:virtualization performance viewerscope:eqversion:1.1

Trust: 0.9

vendor:hpmodel:virtualization performance viewerscope:eqversion:1.0

Trust: 0.9

vendor:hpmodel:tcp/ip services for openvmsscope:eqversion:5.7

Trust: 0.9

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.9

vendor:hitachimodel:advanced server ha8000crscope:eqversion:0

Trust: 0.9

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.9

vendor:freebsdmodel:freebsdscope:eqversion:0

Trust: 0.9

vendor:emcmodel:vipr srmscope:eqversion:3.6.0

Trust: 0.9

vendor:emcmodel:m&rscope:eqversion:6.5

Trust: 0.9

vendor:citrixmodel:netscaler gatewayscope:eqversion:0

Trust: 0.9

vendor:citrixmodel:netscaler application delivery controllerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:webex socialscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:webex meetings server basescope:eqversion:2.5

Trust: 0.9

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5

Trust: 0.9

vendor:ciscomodel:webex meetings server 2.0mr2scope: - version: -

Trust: 0.9

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.9

vendor:ciscomodel:virtualization experience clientscope:eqversion:62150

Trust: 0.9

vendor:ciscomodel:virtual systems operations center for vpe projectscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:virtual security gatewayscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:videoscape conductorscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:videoscape back officescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:video surveillance media serverscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:video delivery system recorderscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:universal small cell ran management system wirelessscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:unity connectionscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:unified sip proxyscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:unified provisioning managerscope:eqversion:8.6

Trust: 0.9

vendor:ciscomodel:unified meetingplacescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:unified intelligence centerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:unified communications managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:unified communications domain managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:ucs managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:ucs invicta seriesscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:ucs directorscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:transaction encryption devicescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:telepresence tx seriesscope:eqversion:90000

Trust: 0.9

vendor:ciscomodel:telepresence te softwarescope:eqversion:-0

Trust: 0.9

vendor:ciscomodel:telepresence systemscope:eqversion:500-370

Trust: 0.9

vendor:ciscomodel:telepresence systemscope:eqversion:500-320

Trust: 0.9

vendor:ciscomodel:telepresence system seriesscope:eqversion:30000

Trust: 0.9

vendor:ciscomodel:telepresence systemscope:eqversion:13000

Trust: 0.9

vendor:ciscomodel:telepresence systemscope:eqversion:11000

Trust: 0.9

vendor:ciscomodel:telepresence systemscope:eqversion:10000

Trust: 0.9

vendor:ciscomodel:telepresence isdn linkscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:telepresencescope:eqversion:13100

Trust: 0.9

vendor:ciscomodel:service control engines system softwarescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:scosscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:remote network control systemscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:remote conditional access systemscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:quantum son suitescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:quantum policy suitescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:prime service catalog virtual appliancescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:prime license managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:prime lan management solutionscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:prime infrastructurescope:eqversion: -

Trust: 0.9

vendor:ciscomodel:prime data center network managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:powervu network centerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:powervu d9190 conditional access managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:powerkey encryption serverscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:physical access managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:onepk all-in-one vmscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:nexus series switchesscope:eqversion:90000

Trust: 0.9

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.9

vendor:ciscomodel:nexus series switchesscope:eqversion:60000

Trust: 0.9

vendor:ciscomodel:nexus series switchesscope:eqversion:50000

Trust: 0.9

vendor:ciscomodel:nexus series switchesscope:eqversion:40000

Trust: 0.9

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.9

vendor:ciscomodel:nexus series switchesscope:eqversion:1000v0

Trust: 0.9

vendor:ciscomodel:network configuration and change management servicescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:network configuration and change managementscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:netflow collection agentscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:mediasensescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:media experience enginesscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:mds series multilayer switchesscope:eqversion:90000

Trust: 0.9

vendor:ciscomodel:management heartbeat serverscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:jabber guestscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:iptv service delivery systemscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:ip interoperability and collaboration systemscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:ios xr softwarescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:ios xr for cisco network convergence systemscope:eqversion:60000

Trust: 0.9

vendor:ciscomodel:international digital network control systemscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:intelligent automation for cloudscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:im and presence servicescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:firesight system softwarescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:finessescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:explorer controllerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:enterprise content delivery servicescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:encryption appliancescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:emergency responderscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:emergency responderscope: - version: -

Trust: 0.9

vendor:ciscomodel:dncs application serverscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:digital transport adapter control systemscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:digital network control systemscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:digital media managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:dcm series 9900-digital content managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:d9036 modular encoding platformscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:common services platform collectorscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:common download serverscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:command serverscope:eqversion:20000

Trust: 0.9

vendor:ciscomodel:cloud object storescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:telepresence endpoints sx seriesscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:telepresence endpoints mxg2 seriesscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:telepresence endpoints mx seriesscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:telepresence endpoints ex seriesscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:telepresence endpoints c seriesscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:telepresence endpoints 10" touch panelscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:ironport encryption appliancescope:eqversion:0

Trust: 0.9

vendor:ciscomodel:application policy infrastructure controllerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:autobackup serverscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:asa cx and cisco prime security managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:application networking managerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:application and content networking systemscope:eqversion:0

Trust: 0.9

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.9

vendor:avayamodel:one-x client enablement services sp2scope:eqversion:6.2

Trust: 0.9

vendor:avayamodel:one-x client enablement servicesscope:eqversion:6.2

Trust: 0.9

vendor:avayamodel:aura session managerscope:eqversion:6.3

Trust: 0.9

vendor:junipermodel:junos os 14.2r3scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 14.1x55-d16scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 14.1x50-d90scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 14.1r5scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 13.3r6scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 13.2r8scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 12.3x48-d15scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 12.3r9scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 12.1x47-d20scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 12.1x46-d35scope:neversion: -

Trust: 0.9

vendor:junipermodel:junos os 12.1x44-d50scope:neversion: -

Trust: 0.9

vendor:ibmmodel:smartcloud entry fpscope:neversion:3.110

Trust: 0.9

vendor:emcmodel:vipr srmscope:neversion:3.6.1

Trust: 0.9

vendor:emcmodel:m&r 6.5u1scope:neversion: -

Trust: 0.9

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:efficientipmodel: - scope: - version: -

Trust: 0.8

vendor:f5model: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:huaweimodel: - scope: - version: -

Trust: 0.8

vendor:necmodel: - scope: - version: -

Trust: 0.8

vendor:ntpmodel: - scope: - version: -

Trust: 0.8

vendor:omnitimodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:watchguardmodel: - scope: - version: -

Trust: 0.8

vendor:ntpmodel:ntpscope:ltversion:4.2.7p11

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:/sigmablade em card (n8405-043) for firmware rev.14.02 before

Trust: 0.8

vendor:necmodel:istoragescope:eqversion:ne single model / cluster model ver.002.08.08 previous version

Trust: 0.8

vendor:necmodel:istoragescope:eqversion:nv7400/nv5400/nv3400 series

Trust: 0.8

vendor:necmodel:istoragescope:eqversion:nv7500/nv5500/nv3500 series

Trust: 0.8

vendor:necmodel:securebranchscope:eqversion:version 3.2

Trust: 0.8

vendor:necmodel:univergescope:eqversion:3c cmm

Trust: 0.8

vendor:necmodel:univergescope:eqversion:ip8800 series

Trust: 0.8

vendor:hitachimodel:bsscope:eqversion:2000 series

Trust: 0.8

vendor:hitachimodel:bsscope:eqversion:320 series

Trust: 0.8

vendor:hitachimodel:bsscope:eqversion:500 series

Trust: 0.8

vendor:hitachimodel:ha8000 seriesscope: - version: -

Trust: 0.8

vendor:susemodel:linux enterprise server sp1 ltssscope:eqversion:11

Trust: 0.6

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.6

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.6

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.3

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.14

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.3.4

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.3.3

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.3.2

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.3.0

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.2.5

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.2.4

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.2.0

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.1.9

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.1.8

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.1.3

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.1.1

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.1.0

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.0.13

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.0.12

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.0.11

Trust: 0.6

vendor:ibmmodel:viosscope:eqversion:2.2.0.10

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:57100

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:56003

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:56002

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:56001

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:20500

Trust: 0.6

vendor:ibmmodel:smart analytics systemscope:eqversion:10500

Trust: 0.6

vendor:ibmmodel:infosphere balanced warehouse c4000scope:eqversion:0

Trust: 0.6

vendor:ibmmodel:infosphere balanced warehouse c3000scope:eqversion:0

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.20

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.1.0

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.3.0.0

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.2.1.0

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.2.0.0

Trust: 0.6

vendor:ibmmodel:flex system managerscope:eqversion:1.1.0.0

Trust: 0.6

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.6

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.6

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.6

vendor:hpmodel:vcxscope:eqversion:0

Trust: 0.6

vendor:ciscomodel:telepresence profile seriesscope:eqversion:0

Trust: 0.6

vendor:ciscomodel:show and sharescope:eqversion:0

Trust: 0.6

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.6

vendor:avayamodel:proactive contactscope:eqversion:5.1

Trust: 0.6

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.6

vendor:avayamodel:one-x client enablement servicesscope:eqversion:6.1.2

Trust: 0.6

vendor:avayamodel:one-x client enablement servicesscope:eqversion:6.1.1

Trust: 0.6

vendor:avayamodel:message networkingscope:eqversion:6.3

Trust: 0.6

vendor:avayamodel:message networkingscope:eqversion:6.2.0

Trust: 0.6

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.6

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.6

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.6

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.6

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.6

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.6

vendor:avayamodel:ip office server editionscope:eqversion:9.0

Trust: 0.6

vendor:avayamodel:ip office server editionscope:eqversion:8.1

Trust: 0.6

vendor:avayamodel:ip office application server spscope:eqversion:9.02

Trust: 0.6

vendor:avayamodel:ip office application server spscope:eqversion:9.01

Trust: 0.6

vendor:avayamodel:ip office application serverscope:eqversion:9.0

Trust: 0.6

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.6

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.6

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.6

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.6

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.6

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.6

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.6

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.6

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.6

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.6

vendor:avayamodel:cms r17scope: - version: -

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.2.1

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.3

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.2.1.0.9

Trust: 0.6

vendor:avayamodel:aura system platform sp1scope:eqversion:6.2

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.2

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.9.3

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.8.3

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.0.3.0.3

Trust: 0.6

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.3

Trust: 0.6

vendor:avayamodel:aura system manager sp3scope:eqversion:6.2

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.1.5

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.6

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.3.1

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.1.5

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.0.1

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.3.3

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.2.2

Trust: 0.6

vendor:avayamodel:aura session manager sp1scope:eqversion:6.2

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.6

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.2

Trust: 0.6

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.6

vendor:avayamodel:aura presence services sp1scope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.6

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura experience portalscope:eqversion:6.0.2

Trust: 0.6

vendor:avayamodel:aura experience portalscope:eqversion:6.0.1

Trust: 0.6

vendor:avayamodel:aura experience portalscope:eqversion:7.0

Trust: 0.6

vendor:avayamodel:aura experience portal sp2scope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura experience portal sp1scope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura conferencingscope:eqversion:8.0

Trust: 0.6

vendor:avayamodel:aura conferencingscope:eqversion:7.0

Trust: 0.6

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura conferencing sp1 standardscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura communication managerscope:eqversion:6.3

Trust: 0.6

vendor:avayamodel:aura communication managerscope:eqversion:6.2

Trust: 0.6

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.6

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.6

vendor:avayamodel:aura collaboration environmentscope:eqversion:3.0

Trust: 0.6

vendor:avayamodel:aura collaboration environmentscope:eqversion:2.0

Trust: 0.6

vendor:avayamodel:aura application server sip corescope:eqversion:53003.0

Trust: 0.6

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.2

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.6

vendor:hpmodel:vcxscope:neversion:9.8.17

Trust: 0.6

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.6

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.6

vendor:meinbergmodel:network time protocolscope:neversion:4.2.8

Trust: 0.6

vendor:hitachimodel:bladesymphony cb500 seriesscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:bladesymphony cb320 seriesscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:bladesymphony cb2000 seriesscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:bladesymphony bs500 seriesscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:bladesymphony bs320 seriesscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:bladesymphony bs2000 seriesscope:eqversion:0

Trust: 0.3

vendor:meinbergmodel:ntpscope:neversion:4.2.8

Trust: 0.3

vendor:meinbergmodel:ntp 4.2.7p11scope:neversion: -

Trust: 0.3

vendor:meinbergmodel:network time protocol 4.2.7p230scope:neversion: -

Trust: 0.3

vendor:susemodel:opensuse evergreenscope:eqversion:11.4

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:12.3

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.2

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.1

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

sources: CERT/CC: VU#852879 // BID: 71757 // BID: 71762 // BID: 71758 // JVNDB: JVNDB-2014-007350 // NVD: CVE-2014-9293

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-9293
value: HIGH

Trust: 1.0

NVD: CVE-2014-9293
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2014-9293
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2014-9293
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: JVNDB: JVNDB-2014-007350 // NVD: CVE-2014-9293

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2014-007350 // NVD: CVE-2014-9293

THREAT TYPE

network

Trust: 0.9

sources: BID: 71757 // BID: 71762 // BID: 71758

TYPE

Design Error

Trust: 0.6

sources: BID: 71757 // BID: 71762

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-007350

PATCH

title:ntp-4.2.2p1-18.0.1.AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=4191&sType=&sProduct=&published=1

Trust: 0.8

title:ntp-4.2.6p5-2.0.2.AXS4url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=4190&sType=&sProduct=&published=1

Trust: 0.8

title:cisco-sa-20141222-ntpdurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

Trust: 0.8

title:HPSBGN03277 SSRT101957url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04582466

Trust: 0.8

title:HPSBPV03266 SSRT101878url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04574882

Trust: 0.8

title:NV15-009url:http://jpn.nec.com/security-info/secinfo/nv15-009.html

Trust: 0.8

title:Bug 2665url:http://bugs.ntp.org/show_bug.cgi?id=2665

Trust: 0.8

title:Security Noticeurl:http://support.ntp.org/bin/view/Main/SecurityNotice

Trust: 0.8

title:Changes for ntpd/ntp_config.curl:http://bk1.ntp.org/ntp-dev/ntpd/ntp_config.c?PAGE=diffs&REV=4b6089c5KXhXqZqocF0DMXnQQsjOuw

Trust: 0.8

title:Bug 1176032url:https://bugzilla.redhat.com/show_bug.cgi?id=1176032

Trust: 0.8

title:RHSA-2015:0104url:https://rhn.redhat.com/errata/RHSA-2015-0104.html

Trust: 0.8

title:RHSA-2014:2025url:https://rhn.redhat.com/errata/RHSA-2014-2025.html

Trust: 0.8

title:サーバ・クライアント製品 Network Time Protocol daemon (ntpd)の脆弱性(CVE-2014-9293〜9296)による影響についてurl:http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/ntpd_cve-2014-9293.html

Trust: 0.8

title:cisco-sa-20141222-ntpdurl:http://www.cisco.com/cisco/web/support/JP/112/1127/1127934_cisco-sa-20141222-ntpd-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2014-007350

EXTERNAL IDS

db:CERT/CCid:VU#852879

Trust: 3.6

db:NVDid:CVE-2014-9293

Trust: 3.4

db:BIDid:71757

Trust: 1.3

db:ICS CERTid:ICSA-14-353-01

Trust: 1.1

db:SECUNIAid:62209

Trust: 1.0

db:MCAFEEid:SB10103

Trust: 1.0

db:ICS CERTid:ICSA-14-353-01A

Trust: 0.9

db:JUNIPERid:JSA10663

Trust: 0.9

db:ICS CERTid:ICSA-14-353-01C

Trust: 0.8

db:JVNid:JVNVU96605606

Trust: 0.8

db:JVNDBid:JVNDB-2014-007350

Trust: 0.8

db:BIDid:71762

Trust: 0.3

db:BIDid:71758

Trust: 0.3

db:PACKETSTORMid:129716

Trust: 0.1

db:PACKETSTORMid:129793

Trust: 0.1

db:PACKETSTORMid:134756

Trust: 0.1

db:PACKETSTORMid:130140

Trust: 0.1

db:PACKETSTORMid:129686

Trust: 0.1

db:PACKETSTORMid:130031

Trust: 0.1

db:PACKETSTORMid:129723

Trust: 0.1

sources: CERT/CC: VU#852879 // BID: 71757 // BID: 71762 // BID: 71758 // JVNDB: JVNDB-2014-007350 // PACKETSTORM: 129716 // PACKETSTORM: 129793 // PACKETSTORM: 134756 // PACKETSTORM: 130140 // PACKETSTORM: 129686 // PACKETSTORM: 130031 // PACKETSTORM: 129723 // NVD: CVE-2014-9293

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141222-ntpd

Trust: 2.7

url:http://www.kb.cert.org/vuls/id/852879

Trust: 2.7

url:http://support.ntp.org/bin/view/main/securitynotice

Trust: 1.9

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 1.9

url:http://advisories.mageia.org/mgasa-2014-0541.html

Trust: 1.9

url:http://lists.ntp.org/pipermail/announce/2014-december/000122.html

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=1176032

Trust: 1.6

url:http://www.ntp.org/downloads.html

Trust: 1.4

url:https://ics-cert.us-cert.gov/advisories/icsa-14-353-01

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-0104.html

Trust: 1.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04790232

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=144182594518755&w=2

Trust: 1.0

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04916783

Trust: 1.0

url:http://bk1.ntp.org/ntp-dev/ntpd/ntp_config.c?page=diffs&rev=4b6089c5kxhxqzqocf0dmxnqqsjouw

Trust: 1.0

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10103

Trust: 1.0

url:http://bugs.ntp.org/show_bug.cgi?id=2665

Trust: 1.0

url:http://secunia.com/advisories/62209

Trust: 1.0

url:http://www.securityfocus.com/bid/71757

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142469153211996&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142853370924302&w=2

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:003

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=142590659431171&w=2

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2014-2025.html

Trust: 1.0

url:https://rhn.redhat.com/errata/rhsa-2014-2024.html

Trust: 0.9

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10663&cat=sirt_1&actp=list

Trust: 0.9

url:http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-408044.htm

Trust: 0.9

url:http://support.citrix.com/article/ctx200355

Trust: 0.9

url:http://seclists.org/bugtraq/2015/jan/att-97/esa-2015-004.txt

Trust: 0.9

url:https://www.freebsd.org/security/advisories/freebsd-sa-14:31.ntp.asc

Trust: 0.9

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04582466

Trust: 0.9

url:http://seclists.org/bugtraq/2015/sep/41

Trust: 0.9

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04554677

Trust: 0.9

url:http://www-01.ibm.com/support/docview.wss?uid=swg21966675

Trust: 0.9

url:http://www-01.ibm.com/support/docview.wss?uid=swg21696755

Trust: 0.9

url:https://ics-cert.us-cert.gov/advisories/icsa-14-353-01a

Trust: 0.9

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1022036

Trust: 0.9

url:http://www-01.ibm.com/support/docview.wss?uid=swg21696812

Trust: 0.9

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1020645

Trust: 0.9

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097490

Trust: 0.9

url:http://www.hitachi.co.jp/products/it/server/security/global/info/vulnerable/ntpd_cve-2014-9293.html

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9293

Trust: 0.9

url:http://support.ntp.org/bin/view/support/accessrestrictions#section_6.5.2

Trust: 0.8

url:http://www.ntp.org/ntpfaq/ntp-s-algo-crypt.htm

Trust: 0.8

url:http://googleprojectzero.blogspot.com/2015/01/finding-and-exploiting-ntpd.html

Trust: 0.8

url:https://support.apple.com/en-us/ht6601

Trust: 0.8

url:https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15936.html

Trust: 0.8

url:https://www.freebsd.org/security/advisories/freebsd-sa-15:07.ntp.asc

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-14-353-01c

Trust: 0.8

url:http://jvn.jp/vu/jvnvu96605606/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9293

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-9294

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-9293

Trust: 0.7

url:https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04574882

Trust: 0.6

url:https://downloads.avaya.com/css/p8/documents/101006439

Trust: 0.6

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04916783

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21967791

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21699578

Trust: 0.6

url:http://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc

Trust: 0.6

url:https://downloads.avaya.com/css/p8/documents/101006440

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=isg1ssrvpoaix71security150210-1549

Trust: 0.6

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097484

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-9295

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-9296

Trust: 0.5

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_ntp

Trust: 0.3

url:http://www.ntp.org/

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2014-9295

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2014-9294

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2014-9293

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2014-9296

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://www.freebsd.org/handbook/makeworld.html>.

Trust: 0.1

url:https://security.freebsd.org/>.

Trust: 0.1

url:https://security.freebsd.org/advisories/freebsd-sa-14:31.ntp.asc>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-14:31/ntp.patch.asc

Trust: 0.1

url:https://security.freebsd.org/patches/sa-14:31/ntp.patch

Trust: 0.1

url:https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9294>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9296>

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/852879>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9293>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9295>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9294

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9296

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9295

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://support.emc.com/downloads/34247_vipr-srm

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6519

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6511

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6558

Trust: 0.1

url:http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html#appendixjava)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6562

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6517

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4288

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6532

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6468

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6457

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6531

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6527

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6493

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6506

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6476

Trust: 0.1

url:http://nvd.nist.gov/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6515

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6485

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3618

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6456

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6466

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6458

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6512

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6504

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9294

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9296

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9295

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201412-34.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9293

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: CERT/CC: VU#852879 // BID: 71757 // BID: 71762 // BID: 71758 // JVNDB: JVNDB-2014-007350 // PACKETSTORM: 129716 // PACKETSTORM: 129793 // PACKETSTORM: 134756 // PACKETSTORM: 130140 // PACKETSTORM: 129686 // PACKETSTORM: 130031 // PACKETSTORM: 129723 // NVD: CVE-2014-9293

CREDITS

Neel Mehta of the Google Security Team.

Trust: 0.3

sources: BID: 71757

SOURCES

db:CERT/CCid:VU#852879
db:BIDid:71757
db:BIDid:71762
db:BIDid:71758
db:JVNDBid:JVNDB-2014-007350
db:PACKETSTORMid:129716
db:PACKETSTORMid:129793
db:PACKETSTORMid:134756
db:PACKETSTORMid:130140
db:PACKETSTORMid:129686
db:PACKETSTORMid:130031
db:PACKETSTORMid:129723
db:NVDid:CVE-2014-9293

LAST UPDATE DATE

2025-04-30T21:01:22.443000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#852879date:2015-10-27T00:00:00
db:BIDid:71757date:2016-10-26T05:10:00
db:BIDid:71762date:2016-10-26T09:11:00
db:BIDid:71758date:2016-10-26T08:13:00
db:JVNDBid:JVNDB-2014-007350date:2017-03-09T00:00:00
db:NVDid:CVE-2014-9293date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#852879date:2014-12-19T00:00:00
db:BIDid:71757date:2014-12-19T00:00:00
db:BIDid:71762date:2014-12-19T00:00:00
db:BIDid:71758date:2014-12-19T00:00:00
db:JVNDBid:JVNDB-2014-007350date:2014-12-24T00:00:00
db:PACKETSTORMid:129716date:2014-12-24T16:34:30
db:PACKETSTORMid:129793date:2015-01-05T16:17:48
db:PACKETSTORMid:134756date:2015-12-10T17:24:17
db:PACKETSTORMid:130140date:2015-01-29T06:07:22
db:PACKETSTORMid:129686date:2014-12-22T17:16:27
db:PACKETSTORMid:130031date:2015-01-20T17:32:22
db:PACKETSTORMid:129723date:2014-12-26T15:46:55
db:NVDid:CVE-2014-9293date:2014-12-20T02:59:00.053