Vulnerability Name:

CVE-2002-0053 (CCN-8176)

Assigned:2002-02-12
Published:2002-02-12
Updated:2018-10-12
Summary:Buffer overflow in SNMP agent service in Windows 95/98/98SE, Windows NT 4.0, Windows 2000, and Windows XP allows remote attackers to cause a denial of service or execute arbitrary code via a malformed management request.
Note: this candidate may be split or merged with other candidates. This and other PROTOS-related candidates, especially CVE-2002-0012 and CVE-2002-0013, will be updated when more accurate information is available.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.25
OpenServer 5.0.5 OpenServer 5.0.6 : snmpd denial-of-service vulnerabilities.

Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-02:11
ucd-snmp/net-snmp remotely exploitable vulnerabilities

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-004.0
Linux - Various security problems in ucd-snmp

Source: CCN
Type: SGI Security Advisory 20020201-01-A
SNMP Vulnerabilities

Source: CCN
Type: SGI Security Advisory 20020404-01-P
IRIX hpsnmpd vulnerability

Source: CCN
Type: SGI Security Advisory 200207403-01-I
Emulex FibreChannel Hub Vulnerable to SNMP DoS Attack

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.4
Open UNIX, UnixWare 7: snmpd memory fault vulnerabilities

Source: CCN
Type: BugTraq Mailing List, Thu Feb 14 2002 - 15:16:48 CST
Aprisma Response to CERT Advisory

Source: CCN
Type: BugTraq Mailing List, Fri Feb 15 2002 - 20:38:51 CST
SNMP test suite vs. Motorola SB4100 cable modem

Source: CCN
Type: BugTraq Mailing List, Tue Feb 19 2002 - 09:53:48 CST
Cert Advisory 2002-03 and HP JetDirect

Source: CCN
Type: BugTraq Mailing List, Wed Feb 20 2002 - 17:16:15 CST
Check Point response to CERT CA-2002-03 (Multi-vendor SNMP vulnerabilities)

Source: CCN
Type: BugTraq Mailing List, Fri Feb 22 2002 - 04:14:20 CST
Re: Cert Advisory 2002-03 and HP JetDirect

Source: CCN
Type: BugTraq Mailing List, Wed Feb 27 2002 - 07:53:00 CST
UPDATE: Cert Advisory 2002-03 and Ethereal

Source: CCN
Type: BugTraq Mailing List, Mon May 13 2002 - 10:55:22 CDT
ATMSNMPD Vulnerable but not Addressed

Source: MISC
Type: UNKNOWN
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0012

Source: MISC
Type: UNKNOWN
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0013

Source: MITRE
Type: CNA
CVE-2002-0013

Source: MITRE
Type: CNA
CVE-2002-0053

Source: CCN
Type: Compaq Security Advisory SSRT0799
Potential Security Vulnerabilities in SNMP

Source: CCN
Type: Hewlett-Packard Company Security Bulletin HPSBUX0202-184
Sec. Vulnerability in SNMP

Source: CCN
Type: RHSA-2001-163
Updated ucd-snmp packages available

Source: CCN
Type: RHSA-2002-036
Updated ethereal packages available

Source: CCN
Type: RHSA-2002-088
Updated ethereal packages are available

Source: CCN
Type: Sun Alert ID: 44605
The SunATM atmsnmpd(1M) Daemon has a Denial of Service Vulnerability

Source: CCN
Type: Sun Alert ID: 57404
Security Vulnerability Issues With Solstice X.25 snmpx25d daemon

Source: CCN
Type: Sun Microsystems, Inc. Security Bulletin #00215
snmpdx

Source: CCN
Type: Lotus Technote #191059
Lotus Domino SNMP Agents R5.0.1a

Source: CCN
Type: CERT Advisory CA-2002-03
Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-2002-03

Source: CCN
Type: CIAC Information Bulletin M-042
Multiple Vulnerabilities in Multiple Implementations of SNMP

Source: CCN
Type: cisco-sa-20020212-snmp-msgs
Malformed SNMP Message-Handling Vulnerabilities

Source: DEBIAN
Type: DSA-111
ucd-snmp -- remote exploit

Source: CCN
Type: University of Oulu Web site
PROTOS Test-Suite: c06-snmpv1

Source: MISC
Type: UNKNOWN
http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html

Source: CCN
Type: Internet Security Systems Security Alert #110
PROTOS Remote SNMP Attack Tool

Source: CCN
Type: US-CERT VU#107186
Multiple vulnerabilities in SNMPv1 trap handling

Source: CERT-VN
Type: US Government Resource
VU#107186

Source: CCN
Type: US-CERT VU#854306
Multiple vulnerabilities in SNMPv1 request handling

Source: CERT-VN
Type: US Government Resource
VU#854306

Source: CCN
Type: Microsoft Security Bulletin MS02-006
Unchecked Buffer in SNMP Service Could Enable Arbitrary Code to be Run

Source: CCN
Type: nCipher Security Advisory #2
SNMP Vulnerabilities

Source: CCN
Type: BID-3218
Multiple Ucd-Snmp Vulnerabilities

Source: CCN
Type: BID-4089
Multiple Vendor SNMP Request Handling Vulnerabilities

Source: CCN
Type: BID-4132
Cisco Malformed SNMP Message Denial of Service Vulnerabilities

Source: CCN
Type: BID-4134
HP JetDirect SNMP Denial of Service Vulnerability

Source: CCN
Type: BID-4137
Compaq Nonstop Himalaya SNMP Agent Denial Of Service Vulnerability

Source: CCN
Type: BID-4138
Compaq OpenVMS TCP/IP Services SNMP Denial Of Service Vulnerability

Source: CCN
Type: BID-4140
Compaq Tru64 SNMP Agent Denial Of Service Vulnerability

Source: CCN
Type: BID-4168
Ethereal Malformed SNMP Denial of Service Vulnerability

Source: CCN
Type: BID-4203
Net-SNMP Trap And Request Handling Vulnerabilities

Source: CCN
Type: BID-4590
IRIX hpsnmpd SNMP Public Read-Only Community Denial of Service Vulnerability

Source: CCN
Type: BID-4732
SunATM Agent SNMP Request Handling Vulnerability

Source: CCN
Type: BID-8881
Sun Solstice X.25 Denial of Service Vulnerability

Source: CCN
Type: BID-8882
Sun Solstice X.25 snmpx25d Buffer Overflow Vulnerability

Source: MS
Type: UNKNOWN
MS02-006

Source: XF
Type: UNKNOWN
snmp-improper-request-handling(8176)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:209

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:402

Source: CCN
Type: BEA Systems, Inc. Security Advisory (BEA02-16.01)
Patch available for SNMP implementation vulnerability

Source: CCN
Type: Microsoft Knowledge Base Article 314147
MS02-006: An Unchecked Buffer in the SNMP Service May Allow Code to Run

Source: CCN
Type: IBM Security Bulletin 888269 (Security Guardium Data Activity Monitor)
IBM Security Guardium Database Activity Monitor is affected by an Upgrade SNMPD to v3 vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_95:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98:*:gold:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:gold:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • AND
  • cpe:/o:hp:hp-ux:10.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.09:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_domino:*:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.01:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.10:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/h:hp:jetdirect:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.30:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.16:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.24:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.26:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.20:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:linux_powertools:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:hp:openview_emanate_snmp_agent:14.2:*:*:*:*:*:*:*
  • OR cpe:/h:hp:nonstop_himalaya:-:*:*:*:*:*:*:*
  • OR cpe:/a:hp:tcp_ip_services_openvms:*:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.23:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21:*:*:*:*:*:*:*
  • OR cpe:/a:sun:solstice_x.25:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.24:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.22:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.23:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.25:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.22m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.26:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.27:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11i:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.31:*:*:*:*:*:*:*
  • OR cpe:/a:compaq:sanworks_resource_monitor:-:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.02:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.03:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.08:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.34:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.10:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.2:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.4:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5_20:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:209
    V
    SNMP Agent Service Buffer Overflow
    2011-05-16
    oval:org.mitre.oval:def:402
    V
    SNMP Request Handling Buffer Overflow
    2008-03-24
    BACK
    microsoft windows 2000 *
    microsoft windows 95 *
    microsoft windows 98 * gold
    microsoft windows 98se *
    microsoft windows nt 4.0
    microsoft windows xp * gold
    hp hp-ux 10.20
    hp hp-ux 10.00
    hp hp-ux 10.09
    sun solaris 2.5.1
    ibm lotus domino *
    sun solaris 2.6
    sgi irix 6.5
    hp hp-ux 10.01
    hp hp-ux 10.10
    hp hp-ux 11.00
    hp jetdirect *
    hp hp-ux 10.30
    hp hp-ux 10.16
    sgi irix 6.5.1
    sgi irix 6.5.2
    sgi irix 6.5.3
    sgi irix 6.5.4
    sun solaris 8
    redhat linux 6.2
    cisco ios *
    hp hp-ux 11.04
    suse suse linux 6.4
    debian debian linux 2.2
    mandrakesoft mandrake linux 7.1
    freebsd ports collection *
    redhat linux 7
    hp hp-ux 11.11
    mandrakesoft mandrake linux 7.2
    hp hp-ux 10.24
    suse suse linux 7.0
    hp hp-ux 10.26
    sgi irix 6.5.7
    mandrakesoft mandrake linux corporate server 1.0.1
    sun sunos 5.8
    suse suse linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    sgi irix 6.5.5
    sgi irix 6.5.6
    sgi irix 6.5.8
    mandrakesoft mandrake single network firewall 7.2
    suse suse linux 7.2
    sun sunos 5.7
    sun sunos 5.6
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    hp hp-ux 11.20
    suse suse linux 7.3
    sun solaris 1.0
    redhat linux powertools 6.2
    sgi irix 6.5.9
    sgi irix 6.5.10
    sgi irix 6.5.11
    redhat linux powertools 7.0
    hp openview emanate snmp agent 14.2
    hp nonstop himalaya -
    hp tcp ip services openvms *
    ethereal_group ethereal 0.8.13
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux connectivity server *
    sgi irix 6.5.12
    sgi irix 6.5.13
    sgi irix 6.5.14
    redhat linux 7.3
    sgi irix 6.5.15
    sgi irix 6.5.16
    oracle weblogic server 6.1
    hp hp-ux 11.22
    oracle weblogic server 5.1
    sgi irix 6.5.19
    hp hp-ux 11.23
    sgi irix 6.5.20
    sgi irix 6.5.21
    sun solstice x.25 9.2
    sgi irix 6.5.24
    sgi irix 6.5.22
    sgi irix 6.5.23
    sun solaris 7.0
    sgi irix 6.5.25
    sgi irix 6.5.22m
    sgi irix 6.5.21m
    sgi irix 6.5.21f
    sgi irix 6.5.26
    sgi irix 6.5.27
    hp hp-ux 11.11i
    hp hp-ux 11.31
    compaq sanworks resource monitor -
    hp hp-ux 10.02
    hp hp-ux 10.03
    hp hp-ux 10.08
    hp hp-ux 10.34
    hp hp-ux 11.0.4
    hp hp-ux 11.10
    hp hp-ux 11.2
    hp hp-ux 11.4
    sgi irix 6.5.10f
    sgi irix 6.5.10m
    sgi irix 6.5.11f
    sgi irix 6.5.11m
    sgi irix 6.5.12f
    sgi irix 6.5.12m
    sgi irix 6.5.13f
    sgi irix 6.5.13m
    sgi irix 6.5.14f
    sgi irix 6.5.14m
    sgi irix 6.5.15f
    sgi irix 6.5.15m
    sgi irix 6.5.16f
    sgi irix 6.5.16m
    sgi irix 6.5.17
    sgi irix 6.5.17f
    sgi irix 6.5.17m
    sgi irix 6.5.18
    sgi irix 6.5.18f
    sgi irix 6.5.18m
    sgi irix 6.5.19f
    sgi irix 6.5.19m
    sgi irix 6.5.20f
    sgi irix 6.5.20m
    sgi irix 6.5.2f
    sgi irix 6.5.2m
    sgi irix 6.5.3f
    sgi irix 6.5.3m
    sgi irix 6.5.4f
    sgi irix 6.5.4m
    sgi irix 6.5.5f
    sgi irix 6.5.5m
    sgi irix 6.5.6f
    sgi irix 6.5.6m
    sgi irix 6.5.7f
    sgi irix 6.5.7m
    sgi irix 6.5.8f
    sgi irix 6.5.8m
    sgi irix 6.5.9f
    sgi irix 6.5.9m
    sgi irix 6.5_20