Vulnerability Name:

CVE-2014-3566

Assigned:2014-05-14
Published:2014-10-14
Updated:2017-11-14
Summary:The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
CVSS v3 Severity:3.1 Low (CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
3.7 Low (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.5 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:W/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:W/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:W/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-310
CWE-636
CWE-757
References:Source: NETBSD
Type: UNKNOWN
NetBSD-SA2014-015

Source: CONFIRM
Type: UNKNOWN
http://advisories.mageia.org/MGASA-2014-0416.html

Source: CONFIRM
Type: UNKNOWN
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc

Source: APPLE
Type: UNKNOWN
APPLE-SA-2014-10-16-1

Source: APPLE
Type: UNKNOWN
APPLE-SA-2014-10-16-3

Source: MISC
Type: UNKNOWN
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566

Source: MISC
Type: UNKNOWN
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html

Source: CONFIRM
Type: UNKNOWN
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/

Source: CONFIRM
Type: UNKNOWN
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx

Source: CONFIRM
Type: UNKNOWN
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf

Source: CONFIRM
Type: UNKNOWN
http://downloads.asterisk.org/pub/security/AST-2014-011.html

Source: MISC
Type: UNKNOWN
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html

Source: HP
Type: UNKNOWN
HPSBUX03281

Source: CONFIRM
Type: UNKNOWN
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034

Source: CONFIRM
Type: UNKNOWN
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

Source: APPLE
Type: UNKNOWN
APPLE-SA-2015-01-27-4

Source: APPLE
Type: UNKNOWN
APPLE-SA-2015-09-16-2

Source: FEDORA
Type: UNKNOWN
FEDORA-2014-12951

Source: FEDORA
Type: UNKNOWN
FEDORA-2014-13069

Source: FEDORA
Type: UNKNOWN
FEDORA-2014-13012

Source: FEDORA
Type: UNKNOWN
FEDORA-2015-9110

Source: FEDORA
Type: UNKNOWN
FEDORA-2015-9090

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2014:1331

Source: SUSE
Type: UNKNOWN
SUSE-SU-2014:1357

Source: SUSE
Type: UNKNOWN
SUSE-SU-2014:1361

Source: SUSE
Type: UNKNOWN
SUSE-SU-2014:1526

Source: SUSE
Type: UNKNOWN
SUSE-SU-2014:1549

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2015:0190

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0336

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0344

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0345

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0376

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0392

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0503

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0578

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2016:0640

Source: SUSE
Type: UNKNOWN
SUSE-SU-2016:1457

Source: SUSE
Type: UNKNOWN
SUSE-SU-2016:1459

Source: HP
Type: UNKNOWN
HPSBMU03152

Source: HP
Type: UNKNOWN
HPSBHF03156

Source: HP
Type: UNKNOWN
SSRT101767

Source: HP
Type: UNKNOWN
HPSBGN03191

Source: HP
Type: UNKNOWN
HPSBMU03184

Source: HP
Type: UNKNOWN
HPSBGN03164

Source: HP
Type: UNKNOWN
HPSBGN03192

Source: HP
Type: UNKNOWN
HPSBMU03183

Source: HP
Type: UNKNOWN
HPSBMU03214

Source: HP
Type: UNKNOWN
HPSBGN03201

Source: HP
Type: UNKNOWN
HPSBGN03203

Source: HP
Type: UNKNOWN
HPSBGN03202

Source: HP
Type: UNKNOWN
HPSBGN03209

Source: HP
Type: UNKNOWN
HPSBGN03205

Source: HP
Type: UNKNOWN
HPSBGN03222

Source: HP
Type: UNKNOWN
SSRT101838

Source: HP
Type: UNKNOWN
SSRT101849

Source: HP
Type: UNKNOWN
SSRT101779

Source: HP
Type: UNKNOWN
SSRT101868

Source: HP
Type: UNKNOWN
SSRT101854

Source: HP
Type: UNKNOWN
SSRT101897

Source: HP
Type: UNKNOWN
SSRT101898

Source: HP
Type: UNKNOWN
SSRT101896

Source: HP
Type: UNKNOWN
SSRT101899

Source: HP
Type: UNKNOWN
SSRT101928

Source: HP
Type: UNKNOWN
SSRT101894

Source: HP
Type: UNKNOWN
SSRT101951

Source: HP
Type: UNKNOWN
HPSBST03265

Source: HP
Type: UNKNOWN
SSRT101968

Source: HP
Type: UNKNOWN
HPSBMU03267

Source: HP
Type: UNKNOWN
SSRT101922

Source: HP
Type: UNKNOWN
HPSBMU03259

Source: HP
Type: UNKNOWN
SSRT101916

Source: HP
Type: UNKNOWN
SSRT101921

Source: HP
Type: UNKNOWN
SSRT101846

Source: HP
Type: UNKNOWN
SSRT101998

Source: HP
Type: UNKNOWN
SSRT101790

Source: HP
Type: UNKNOWN
SSRT101795

Source: HP
Type: UNKNOWN
HPSBMU03304

Source: HP
Type: UNKNOWN
HPSBHF03300

Source: HP
Type: UNKNOWN
HPSBST03195

Source: HP
Type: UNKNOWN
HPSBGN03305

Source: HP
Type: UNKNOWN
SSRT101892

Source: HP
Type: UNKNOWN
SSRT101834

Source: HP
Type: UNKNOWN
HPSBGN03332

Source: HP
Type: UNKNOWN
HPSBMU03263

Source: HP
Type: UNKNOWN
HPSBMU03261

Source: HP
Type: UNKNOWN
HPSBMU03223

Source: HP
Type: UNKNOWN
HPSBPI03107

Source: HP
Type: UNKNOWN
HPSBPI03360

Source: HP
Type: UNKNOWN
HPSBMU03234

Source: HP
Type: UNKNOWN
HPSBMU03416

Source: HP
Type: UNKNOWN
HPSBST03418

Source: HP
Type: UNKNOWN
HPSBGN03391

Source: HP
Type: UNKNOWN
HPSBGN03569

Source: MLIST
Type: UNKNOWN
[openssl-dev] 20141014 Patch to mitigate CVE-2014-3566 ("POODLE")

Source: CONFIRM
Type: UNKNOWN
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1652

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1653

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1692

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1876

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1877

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1880

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1881

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1882

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1920

Source: REDHAT
Type: UNKNOWN
RHSA-2014:1948

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0068

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0079

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0080

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0085

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0086

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0264

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0698

Source: REDHAT
Type: UNKNOWN
RHSA-2015:1545

Source: REDHAT
Type: UNKNOWN
RHSA-2015:1546

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/HT204244

Source: CONFIRM
Type: UNKNOWN
http://support.citrix.com/article/CTX200238

Source: CISCO
Type: UNKNOWN
20141014 SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21686997

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21687172

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21687611

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21688283

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21692299

Source: DEBIAN
Type: UNKNOWN
DSA-3053

Source: DEBIAN
Type: UNKNOWN
DSA-3144

Source: DEBIAN
Type: UNKNOWN
DSA-3147

Source: DEBIAN
Type: UNKNOWN
DSA-3253

Source: DEBIAN
Type: UNKNOWN
DSA-3489

Source: CERT-VN
Type: UNKNOWN
VU#577193

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2014:203

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2015:062

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Source: APPLE
Type: UNKNOWN
APPLE-SA-2014-10-20-2

Source: APPLE
Type: UNKNOWN
APPLE-SA-2014-10-20-1

Source: APPLE
Type: UNKNOWN
APPLE-SA-2014-10-16-4

Source: BID
Type: UNKNOWN
70574

Source: SECTRACK
Type: UNKNOWN
1031029

Source: SECTRACK
Type: UNKNOWN
1031039

Source: SECTRACK
Type: UNKNOWN
1031085

Source: SECTRACK
Type: UNKNOWN
1031086

Source: SECTRACK
Type: UNKNOWN
1031087

Source: SECTRACK
Type: UNKNOWN
1031088

Source: SECTRACK
Type: UNKNOWN
1031089

Source: SECTRACK
Type: UNKNOWN
1031090

Source: SECTRACK
Type: UNKNOWN
1031091

Source: SECTRACK
Type: UNKNOWN
1031092

Source: SECTRACK
Type: UNKNOWN
1031093

Source: SECTRACK
Type: UNKNOWN
1031094

Source: SECTRACK
Type: UNKNOWN
1031095

Source: SECTRACK
Type: UNKNOWN
1031096

Source: SECTRACK
Type: UNKNOWN
1031105

Source: SECTRACK
Type: UNKNOWN
1031106

Source: SECTRACK
Type: UNKNOWN
1031107

Source: SECTRACK
Type: UNKNOWN
1031120

Source: SECTRACK
Type: UNKNOWN
1031123

Source: SECTRACK
Type: UNKNOWN
1031124

Source: SECTRACK
Type: UNKNOWN
1031130

Source: SECTRACK
Type: UNKNOWN
1031131

Source: SECTRACK
Type: UNKNOWN
1031132

Source: UBUNTU
Type: UNKNOWN
USN-2486-1

Source: UBUNTU
Type: UNKNOWN
USN-2487-1

Source: CERT
Type: UNKNOWN
TA14-290A

Source: CONFIRM
Type: UNKNOWN
http://www.vmware.com/security/advisories/VMSA-2015-0003.html

Source: CONFIRM
Type: UNKNOWN
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0

Source: CONFIRM
Type: UNKNOWN
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm

Source: CONFIRM
Type: UNKNOWN
https://access.redhat.com/articles/1232123

Source: CONFIRM
Type: UNKNOWN
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/

Source: CONFIRM
Type: UNKNOWN
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6

Source: CONFIRM
Type: UNKNOWN
https://bto.bluecoat.com/security-advisory/sa83

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1152789

Source: CONFIRM
Type: UNKNOWN
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip

Source: XF
Type: UNKNOWN
ssl-cve20143566-info-disc(97013)

Source: CONFIRM
Type: UNKNOWN
https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946

Source: CONFIRM
Type: UNKNOWN
https://kc.mcafee.com/corporate/index?page=content&id=SB10090

Source: CONFIRM
Type: UNKNOWN
https://kc.mcafee.com/corporate/index?page=content&id=SB10091

Source: CONFIRM
Type: UNKNOWN
https://kc.mcafee.com/corporate/index?page=content&id=SB10104

Source: GENTOO
Type: UNKNOWN
GLSA-201507-14

Source: GENTOO
Type: UNKNOWN
GLSA-201606-11

Source: CONFIRM
Type: UNKNOWN
https://security.netapp.com/advisory/ntap-20141015-0001/

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/HT205217

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT6527

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT6529

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT6531

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT6535

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT6536

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT6541

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT6542

Source: CONFIRM
Type: UNKNOWN
https://support.citrix.com/article/CTX216642

Source: CONFIRM
Type: UNKNOWN
https://support.lenovo.com/product_security/poodle

Source: CONFIRM
Type: UNKNOWN
https://support.lenovo.com/us/en/product_security/poodle

Source: CONFIRM
Type: UNKNOWN
https://technet.microsoft.com/library/security/3009008.aspx

Source: CONFIRM
Type: UNKNOWN
https://www-01.ibm.com/support/docview.wss?uid=swg21688165

Source: CONFIRM
Type: UNKNOWN
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html

Source: MISC
Type: UNKNOWN
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html

Source: CONFIRM
Type: UNKNOWN
https://www.elastic.co/blog/logstash-1-4-3-released

Source: MISC
Type: UNKNOWN
https://www.imperialviolet.org/2014/10/14/poodle.html

Source: CONFIRM
Type: UNKNOWN
https://www.openssl.org/news/secadv_20141015.txt

Source: MISC
Type: VENDOR_ADVISORY
https://www.openssl.org/~bodo/ssl-poodle.pdf

Source: CONFIRM
Type: UNKNOWN
https://www.suse.com/support/kb/doc.php?id=7015773

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:76.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:ibm:aix:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:7.1:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:mageia:mageia:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:mageia:mageia:4.0:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:novell:opensuse:12.3:*:*:*:*:*:*:*
  • OR cpe:/o:novell:opensuse:13.1:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:11.0:sp3:~~~vmware~~:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:fedoraproject:fedora:19:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:20:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:21:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:vios:2.2.3.4:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:rhel_extras:6:*:*:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/a:redhat:rhel_extras:7:*:*:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/a:redhat:rhel_extras_oracle_java:6:*:*:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/a:redhat:rhel_extras_oracle_java:5:*:*:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/a:redhat:rhel_extras_oracle_java:7:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20143566
    V
    CVE-2014-3566
    2017-11-19
    oval:org.cisecurity:def:1765
    V
    Vulnerability in SSL 3.0 as used in OpenSSL through 1.0.1i - CVE-2014-3566
    2017-02-24
    oval:org.cisecurity:def:487
    V
    Vulnerability in SSLv3 affects imapd and popd (CVE-2014-3566)
    2016-05-27
    oval:org.cisecurity:def:449
    V
    Vulnerability in SSLv3 affects ftpd (CVE-2014-3566)
    2016-05-14
    oval:org.cisecurity:def:455
    V
    Vulnerability in SSLv3 affects sendmail (CVE-2014-3566)
    2016-05-14
    oval:org.cisecurity:def:275
    V
    AIX 'Padding Oracle On Downgraded Legacy Encryption (POODLE) attack' vulnerability
    2016-02-08
    oval:org.cisecurity:def:180
    P
    DSA-3144-1 -- openjdk-7 -- security update
    2016-02-08
    oval:org.cisecurity:def:235
    P
    DSA-3253-1 -- pound -- security update
    2016-02-08
    oval:org.cisecurity:def:260
    P
    DSA-3147-1 -- openjdk-6 -- security update
    2016-02-08
    oval:org.mitre.oval:def:29233
    P
    SUSE-SU-2015:0108-1 -- Security update for evolution-data-server (moderate)
    2015-08-17
    oval:org.mitre.oval:def:29152
    V
    Vulnerability in SSLv3 affects ftpd, sendmaild, imapd, and popd on AIX
    2015-08-03
    oval:org.mitre.oval:def:28500
    V
    JRE and JDK Vulnerability on HPUX
    2015-06-08
    oval:org.mitre.oval:def:28398
    V
    Potential security vulnerabilities have been identified in the Java RuntimeEnvironment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These vulnerabilitiescould allow remote unauthorized access, disclosure of information, and othervulnerabilities.
    2015-05-11
    oval:org.mitre.oval:def:28595
    V
    Potential security vulnerabilities have been identified in the Java RuntimeEnvironment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These vulnerabilitiescould allow remote unauthorized access, disclosure of information, and othervulnerabilities.
    2015-05-11
    oval:org.mitre.oval:def:27138
    V
    HP-UX Running OpenSSL, Remote Denial of Service (DoS), Unauthorized Access, Man-in-the-Middle (MitM) Attack
    2015-04-20
    oval:org.mitre.oval:def:28097
    P
    SUSE-SU-2014:1549-1 -- Security update for java-1_7_1-ibm (important)
    2015-02-23
    oval:org.mitre.oval:def:28678
    P
    SUSE-SU-2014:1558-1 -- Security update for pure-ftpd (moderate)
    2015-02-23
    oval:org.mitre.oval:def:28044
    P
    SUSE-SU-2014:1557-2 -- Security update for compat-openssl097g (moderate)
    2015-02-23
    oval:org.mitre.oval:def:28488
    P
    SUSE-SU-2014:1519-1 -- Security update for evolution-data-server (moderate)
    2015-01-26
    oval:org.mitre.oval:def:28230
    P
    SUSE-SU-2014:1447-1 -- Security update for openwsman (moderate)
    2015-01-26
    oval:com.redhat.rhsa:def:20150086
    P
    RHSA-2015:0086: java-1.6.0-sun security update (Important)
    2015-01-26
    oval:org.mitre.oval:def:28273
    P
    SUSE-SU-2014:1524-1 -- Security update for openssl (moderate)
    2015-01-26
    oval:org.mitre.oval:def:28457
    P
    SUSE-SU-2014:1387-1 -- Security update for OpenSSL (important)
    2015-01-26
    oval:org.mitre.oval:def:28322
    P
    SUSE-SU-2014:1526-1 -- Security update for IBM Java (important)
    2015-01-26
    oval:org.mitre.oval:def:28481
    P
    SUSE-SU-2014:1512-1 -- Security update for compat-openssl098 (moderate)
    2015-01-26
    oval:org.mitre.oval:def:28223
    P
    SUSE-SU-2014:1386-1 -- Security update for OpenSSL (important)
    2015-01-26
    oval:com.redhat.rhsa:def:20150085
    P
    RHSA-2015:0085: java-1.6.0-openjdk security update (Important)
    2015-01-26
    oval:org.mitre.oval:def:28380
    P
    SUSE-SU-2014:1361-1 -- Security update for OpenSSL (important)
    2015-01-26
    oval:com.redhat.rhsa:def:20150079
    P
    RHSA-2015:0079: java-1.7.0-oracle security update (Critical)
    2015-01-22
    oval:com.redhat.rhsa:def:20150080
    P
    RHSA-2015:0080: java-1.8.0-oracle security update (Critical)
    2015-01-22
    oval:com.redhat.rhsa:def:20150069
    P
    RHSA-2015:0069: java-1.8.0-openjdk security update (Important)
    2015-01-21
    oval:com.redhat.rhsa:def:20150067
    P
    RHSA-2015:0067: java-1.7.0-openjdk security update (Critical)
    2015-01-21
    oval:com.redhat.rhsa:def:20150068
    P
    RHSA-2015:0068: java-1.7.0-openjdk security update (Important)
    2015-01-20
    oval:org.mitre.oval:def:28154
    V
    IBM SDK Java Technology Edition vulnerability
    2015-01-12
    oval:org.mitre.oval:def:27057
    P
    ELSA-2014-1653 -- openssl security update
    2014-12-22
    oval:org.mitre.oval:def:27014
    P
    RHSA-2014:1653: openssl security update (Moderate)
    2014-12-22
    oval:org.mitre.oval:def:27104
    V
    AIX OpenSSL Patch to mitigate CVE-2014-3566
    2014-12-15
    oval:com.redhat.rhsa:def:20141882
    P
    RHSA-2014:1882: java-1.7.0-ibm security update (Critical)
    2014-12-02
    oval:org.mitre.oval:def:26548
    P
    DSA-3053-1 openssl - security update
    2014-11-24
    oval:com.redhat.rhsa:def:20141880
    P
    RHSA-2014:1880: java-1.7.1-ibm security update (Critical)
    2014-11-20
    oval:com.redhat.rhsa:def:20141881
    P
    RHSA-2014:1881: java-1.5.0-ibm security update (Important)
    2014-11-20
    oval:com.redhat.rhsa:def:20141876
    P
    RHSA-2014:1876: java-1.7.0-ibm security update (Critical)
    2014-11-19
    oval:com.redhat.rhsa:def:20141877
    P
    RHSA-2014:1877: java-1.6.0-ibm security update (Critical)
    2014-11-19
    oval:com.ubuntu.precise:def:20143566000
    V
    CVE-2014-3566 on Ubuntu 12.04 LTS (precise) - medium.
    2014-10-14
    oval:com.ubuntu.trusty:def:20143566000
    V
    CVE-2014-3566 on Ubuntu 14.04 LTS (trusty) - medium.
    2014-10-14
    oval:com.ubuntu.xenial:def:20143566000
    V
    CVE-2014-3566 on Ubuntu 16.04 LTS (xenial) - medium.
    2014-10-14
    BACK
    redhat enterprise_linux 5
    redhat enterprise_linux_desktop 6.0
    redhat enterprise_linux_desktop 7.0
    redhat enterprise_linux_desktop_supplementary 5.0
    redhat enterprise_linux_desktop_supplementary 6.0
    redhat enterprise_linux_desktop_supplementary 76.0
    redhat enterprise_linux_server 6.0
    redhat enterprise_linux_server 7.0
    redhat enterprise_linux_server_supplementary 5.0
    redhat enterprise_linux_server_supplementary 6.0
    redhat enterprise_linux_server_supplementary 7.0
    redhat enterprise_linux_workstation 6.0
    redhat enterprise_linux_workstation 7.0
    redhat enterprise_linux_workstation_supplementary 6.0
    redhat enterprise_linux_workstation_supplementary 7.0
    ibm aix 5.3
    ibm aix 6.1
    ibm aix 7.1
    apple mac_os_x 10.10.1
    mageia mageia 3.0
    mageia mageia 4.0
    novell suse_linux_enterprise_desktop 9.0
    novell suse_linux_enterprise_desktop 10.0
    novell suse_linux_enterprise_desktop 11.0
    novell suse_linux_enterprise_desktop 12.0
    novell opensuse 12.3
    novell opensuse 13.1
    novell suse_linux_enterprise_server 11.0 sp3
    novell suse_linux_enterprise_server 11.0 sp3
    novell suse_linux_enterprise_server 12.0
    novell suse_linux_enterprise_software_development_kit 11.0 sp3
    novell suse_linux_enterprise_software_development_kit 12.0
    fedoraproject fedora 19
    fedoraproject fedora 20
    fedoraproject fedora 21
    openssl openssl 0.9.8
    openssl openssl 0.9.8a
    openssl openssl 0.9.8b
    openssl openssl 0.9.8c
    openssl openssl 0.9.8d
    openssl openssl 0.9.8e
    openssl openssl 0.9.8f
    openssl openssl 0.9.8g
    openssl openssl 0.9.8h
    openssl openssl 0.9.8i
    openssl openssl 0.9.8j
    openssl openssl 0.9.8k
    openssl openssl 0.9.8l
    openssl openssl 0.9.8m
    openssl openssl 0.9.8m beta1
    openssl openssl 0.9.8n
    openssl openssl 0.9.8o
    openssl openssl 0.9.8p
    openssl openssl 0.9.8q
    openssl openssl 0.9.8r
    openssl openssl 0.9.8s
    openssl openssl 0.9.8t
    openssl openssl 0.9.8u
    openssl openssl 0.9.8v
    openssl openssl 0.9.8w
    openssl openssl 0.9.8x
    openssl openssl 0.9.8y
    openssl openssl 0.9.8z
    openssl openssl 0.9.8za
    openssl openssl 0.9.8zb
    openssl openssl 1.0.0
    openssl openssl 1.0.0 beta1
    openssl openssl 1.0.0 beta2
    openssl openssl 1.0.0 beta3
    openssl openssl 1.0.0 beta4
    openssl openssl 1.0.0 beta5
    openssl openssl 1.0.0a
    openssl openssl 1.0.0b
    openssl openssl 1.0.0c
    openssl openssl 1.0.0d
    openssl openssl 1.0.0e
    openssl openssl 1.0.0f
    openssl openssl 1.0.0g
    openssl openssl 1.0.0h
    openssl openssl 1.0.0i
    openssl openssl 1.0.0j
    openssl openssl 1.0.0k
    openssl openssl 1.0.0l
    openssl openssl 1.0.0m
    openssl openssl 1.0.0n
    openssl openssl 1.0.1
    openssl openssl 1.0.1 beta1
    openssl openssl 1.0.1 beta2
    openssl openssl 1.0.1 beta3
    openssl openssl 1.0.1a
    openssl openssl 1.0.1b
    openssl openssl 1.0.1c
    openssl openssl 1.0.1d
    openssl openssl 1.0.1e
    openssl openssl 1.0.1f
    openssl openssl 1.0.1g
    openssl openssl 1.0.1h
    openssl openssl 1.0.1i
    ibm vios 2.2.0.10
    ibm vios 2.2.0.11
    ibm vios 2.2.0.12
    ibm vios 2.2.0.13
    ibm vios 2.2.1.0
    ibm vios 2.2.1.1
    ibm vios 2.2.1.3
    ibm vios 2.2.1.4
    ibm vios 2.2.1.5
    ibm vios 2.2.1.6
    ibm vios 2.2.1.7
    ibm vios 2.2.1.8
    ibm vios 2.2.1.9
    ibm vios 2.2.2.0
    ibm vios 2.2.2.1
    ibm vios 2.2.2.2
    ibm vios 2.2.2.3
    ibm vios 2.2.2.4
    ibm vios 2.2.2.5
    ibm vios 2.2.3.0
    ibm vios 2.2.3.1
    ibm vios 2.2.3.2
    ibm vios 2.2.3.3
    ibm vios 2.2.3.4
    netbsd netbsd 5.1
    netbsd netbsd 5.1.1
    netbsd netbsd 5.1.2
    netbsd netbsd 5.1.3
    netbsd netbsd 5.1.4
    netbsd netbsd 5.2
    netbsd netbsd 5.2.1
    netbsd netbsd 5.2.2
    netbsd netbsd 6.0
    netbsd netbsd 6.0 beta
    netbsd netbsd 6.0.1
    netbsd netbsd 6.0.2
    netbsd netbsd 6.0.3
    netbsd netbsd 6.0.4
    netbsd netbsd 6.0.5
    netbsd netbsd 6.0.6
    netbsd netbsd 6.1
    netbsd netbsd 6.1.1
    netbsd netbsd 6.1.2
    netbsd netbsd 6.1.3
    netbsd netbsd 6.1.4
    netbsd netbsd 6.1.5
    debian debian_linux 7.0
    debian debian_linux 8.0
    redhat rhel_extras 5
    redhat rhel_extras 6
    redhat rhel_extras 7
    redhat enterprise_linux 7
    redhat enterprise_linux 6
    redhat enterprise_linux 5
    redhat rhel_extras_oracle_java 6
    redhat rhel_extras_oracle_java 5
    redhat rhel_extras_oracle_java 7