Vulnerability Name: CVE-2002-1378 (CCN-10800) Assigned: 2002-12-06 Published: 2002-12-06 Updated: 2017-07-11 Summary: Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CCN Type: SGI Security Advisory 20031002-01-USGI Advanced Linux Environment security update #3 Source: MITRE Type: CNACVE-2002-1378 Source: CONECTIVA Type: UNKNOWNCLA-2002:556 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:556openldap Source: CCN Type: RHSA-2002-312openldap security update Source: CCN Type: RHSA-2003-040Updated openldap packages available Source: CCN Type: RHSA-2003-208Updated openldap packages available for iSeries and pSeries Source: CCN Type: CIAC Information Bulletin N-043Red Hat openldap Vulnerabilities Source: CIAC Type: UNKNOWNN-043 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-227 Source: DEBIAN Type: DSA-227openldap2 -- buffer overflows and other bugs Source: MISC Type: UNKNOWNhttp://www.linuxsecurity.com/advisories/gentoo_advisory-2704.html Source: CCN Type: Gentoo Linux Security Announcement 200212-12openldap -- remote command execution Source: MANDRAKE Type: UNKNOWNMDKSA-2003:006 Source: SUSE Type: UNKNOWNSuSE-SA:2002:047 Source: REDHAT Type: Patch, Vendor AdvisoryRHSA-2003:040 Source: GENTOO Type: UNKNOWN200212-12 Source: BID Type: UNKNOWN6328 Source: CCN Type: BID-6328OpenLDAP Multiple Buffer Overflow Vulnerabilities Source: CCN Type: TLSA-2003-5Buffer overflows Source: TURBO Type: UNKNOWNTLSA-2003-5 Source: XF Type: UNKNOWNopenldap-slurpd-bo(10800) Source: XF Type: UNKNOWNopenldap-multiple-bo(10800) Source: SUSE Type: SUSE-SA:2002:047OpenLDAP2: remote command execution Vulnerable Configuration: Configuration 1 :cpe:/a:openldap:openldap:*:*:*:*:*:*:*:* (Version <= 2.2.0)Configuration CCN 1 :cpe:/a:openldap:openldap:2.2.0:*:*:*:*:*:*:* AND cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:8:*:*:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux:8:*:*:*:workstation:*:*:* OR cpe:/o:turbolinux:turbolinux:7:*:*:*:server:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:sgi:irix:2.3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2002-1378 (CCN-11286) Assigned: 2002-12-06 Published: 2002-12-06 Updated: 2002-12-06 Summary: OpenLDAP is vulnerable to a buffer overflow in the getfilter family of functions. By supplying a malformed ldapfilter.conf file, a local or remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the OpenLDAP process. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Consequences: Gain Access References: Source: CCN Type: SGI Security Advisory 20031002-01-USGI Advanced Linux Environment security update #3 Source: MITRE Type: CNACVE-2002-1378 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:556openldap Source: CCN Type: RHSA-2002-312openldap security update Source: CCN Type: RHSA-2003-040Updated openldap packages available Source: CCN Type: RHSA-2003-208Updated openldap packages available for iSeries and pSeries Source: CCN Type: CIAC Information Bulletin N-043Red Hat openldap Vulnerabilities Source: DEBIAN Type: DSA-227openldap2 -- buffer overflows and other bugs Source: CCN Type: Gentoo Linux Security Announcement 200212-12openldap -- remote command execution Source: CCN Type: BID-6328OpenLDAP Multiple Buffer Overflow Vulnerabilities Source: CCN Type: TLSA-2003-5Buffer overflows Source: XF Type: UNKNOWNopenldap-ldapfilter-getfilter-bo(11286) Source: SUSE Type: SUSE-SA:2002:047OpenLDAP2: remote command execution Vulnerable Configuration: Configuration CCN 1 :cpe:/a:openldap:openldap:2.2.0:*:*:*:*:*:*:* AND cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:8:*:*:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux:8:*:*:*:workstation:*:*:* OR cpe:/o:turbolinux:turbolinux:7:*:*:*:server:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:sgi:irix:2.3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2002-1378 (CCN-11287) Assigned: 2002-12-06 Published: 2002-12-06 Updated: 2002-12-06 Summary: OpenLDAP is vulnerable to a buffer overflow, caused by improper bounds checking of LDAP entry display templates. By supplying a malformed ldaptemplates.conf file, a local or remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the OpenLDAP process. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Consequences: Gain Access References: Source: CCN Type: SGI Security Advisory 20031002-01-USGI Advanced Linux Environment security update #3 Source: MITRE Type: CNACVE-2002-1378 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:556openldap Source: CCN Type: RHSA-2002-312openldap security update Source: CCN Type: RHSA-2003-040Updated openldap packages available Source: CCN Type: RHSA-2003-208Updated openldap packages available for iSeries and pSeries Source: CCN Type: CIAC Information Bulletin N-043Red Hat openldap Vulnerabilities Source: DEBIAN Type: DSA-227openldap2 -- buffer overflows and other bugs Source: CCN Type: Gentoo Linux Security Announcement 200212-12openldap -- remote command execution Source: CCN Type: BID-6328OpenLDAP Multiple Buffer Overflow Vulnerabilities Source: CCN Type: TLSA-2003-5Buffer overflows Source: XF Type: UNKNOWNopenldap-ldaptemplates-libldap-bo(11287) Source: SUSE Type: SUSE-SA:2002:047OpenLDAP2: remote command execution Vulnerable Configuration: Configuration CCN 1 :cpe:/a:openldap:openldap:2.2.0:*:*:*:*:*:*:* AND cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:8:*:*:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux:8:*:*:*:workstation:*:*:* OR cpe:/o:turbolinux:turbolinux:7:*:*:*:server:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:sgi:irix:2.3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2002-1378 (CCN-11289) Assigned: 2002-12-06 Published: 2002-12-06 Updated: 2002-12-06 Summary: OpenLDAP is vulnerable to a buffer overflow in the slapd daemon, which is the LDAP standalone server daemon. By causing slapd to generate an overly long file name for the file that is used to log rejected replication requests, a local or remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the OpenLDAP process or corrupt any known file owned by the ldap user by exploiting a race condition that occurs after the log file is created. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Consequences: Gain Access References: Source: CCN Type: SGI Security Advisory 20031002-01-USGI Advanced Linux Environment security update #3 Source: MITRE Type: CNACVE-2002-1378 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:556openldap Source: CCN Type: RHSA-2002-312openldap security update Source: CCN Type: RHSA-2003-040Updated openldap packages available Source: CCN Type: RHSA-2003-208Updated openldap packages available for iSeries and pSeries Source: CCN Type: CIAC Information Bulletin N-043Red Hat openldap Vulnerabilities Source: DEBIAN Type: DSA-227openldap2 -- buffer overflows and other bugs Source: CCN Type: Gentoo Linux Security Announcement 200212-12openldap -- remote command execution Source: CCN Type: BID-6328OpenLDAP Multiple Buffer Overflow Vulnerabilities Source: CCN Type: TLSA-2003-5Buffer overflows Source: XF Type: UNKNOWNopenldap-logging-filename-bo(11289) Source: SUSE Type: SUSE-SA:2002:047OpenLDAP2: remote command execution Vulnerable Configuration: Configuration CCN 1 :cpe:/a:openldap:openldap:2.2.0:*:*:*:*:*:*:* AND cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:8:*:*:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux:8:*:*:*:workstation:*:*:* OR cpe:/o:turbolinux:turbolinux:7:*:*:*:server:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:sgi:irix:2.3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
openldap openldap *
openldap openldap 2.2.0
redhat linux 6.2
redhat linux 7
conectiva linux 6.0
suse suse linux 7.1
redhat linux 7.1
mandrakesoft mandrake linux 8.0
turbolinux turbolinux 6.5
suse suse linux 7.2
conectiva linux 7.0
mandrakesoft mandrake linux 8.1
redhat linux 7.2
suse suse linux 7.3
suse suse email server iii
suse suse linux connectivity server *
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0
redhat linux 7.3
debian debian linux 3.0
gentoo linux *
suse suse linux office server *
redhat linux 8.0
mandrakesoft mandrake linux 9.0
suse suse email server 3.1
mandrakesoft mandrake multi network firewall 8.2
turbolinux turbolinux server 6.1
turbolinux turbolinux 8
turbolinux turbolinux 8
turbolinux turbolinux 7
redhat enterprise linux 2.1
redhat enterprise linux 2.1
sgi irix 2.3.1
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 8.0
mandrakesoft mandrake linux 8.1
mandrakesoft mandrake linux 8.2
openldap openldap 2.2.0
redhat linux 6.2
redhat linux 7
conectiva linux 6.0
suse suse linux 7.1
redhat linux 7.1
mandrakesoft mandrake linux 8.0
turbolinux turbolinux 6.5
suse suse linux 7.2
conectiva linux 7.0
mandrakesoft mandrake linux 8.1
redhat linux 7.2
suse suse linux 7.3
suse suse email server iii
suse suse linux connectivity server *
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0
redhat linux 7.3
debian debian linux 3.0
gentoo linux *
suse suse linux office server *
redhat linux 8.0
mandrakesoft mandrake linux 9.0
suse suse email server 3.1
mandrakesoft mandrake multi network firewall 8.2
turbolinux turbolinux server 6.1
turbolinux turbolinux 8
turbolinux turbolinux 8
turbolinux turbolinux 7
redhat enterprise linux 2.1
redhat enterprise linux 2.1
sgi irix 2.3.1
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 8.0
mandrakesoft mandrake linux 8.1
mandrakesoft mandrake linux 8.2
openldap openldap 2.2.0
redhat linux 6.2
redhat linux 7
conectiva linux 6.0
suse suse linux 7.1
redhat linux 7.1
mandrakesoft mandrake linux 8.0
turbolinux turbolinux 6.5
suse suse linux 7.2
conectiva linux 7.0
mandrakesoft mandrake linux 8.1
redhat linux 7.2
suse suse linux 7.3
suse suse email server iii
suse suse linux connectivity server *
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0
redhat linux 7.3
debian debian linux 3.0
gentoo linux *
suse suse linux office server *
redhat linux 8.0
mandrakesoft mandrake linux 9.0
suse suse email server 3.1
mandrakesoft mandrake multi network firewall 8.2
turbolinux turbolinux server 6.1
turbolinux turbolinux 8
turbolinux turbolinux 8
turbolinux turbolinux 7
redhat enterprise linux 2.1
redhat enterprise linux 2.1
sgi irix 2.3.1
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 8.0
mandrakesoft mandrake linux 8.1
mandrakesoft mandrake linux 8.2
openldap openldap 2.2.0
redhat linux 6.2
redhat linux 7
conectiva linux 6.0
suse suse linux 7.1
redhat linux 7.1
mandrakesoft mandrake linux 8.0
turbolinux turbolinux 6.5
suse suse linux 7.2
conectiva linux 7.0
mandrakesoft mandrake linux 8.1
redhat linux 7.2
suse suse linux 7.3
suse suse email server iii
suse suse linux connectivity server *
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0
redhat linux 7.3
debian debian linux 3.0
gentoo linux *
suse suse linux office server *
redhat linux 8.0
mandrakesoft mandrake linux 9.0
suse suse email server 3.1
mandrakesoft mandrake multi network firewall 8.2
turbolinux turbolinux server 6.1
turbolinux turbolinux 8
turbolinux turbolinux 8
turbolinux turbolinux 7
redhat enterprise linux 2.1
redhat enterprise linux 2.1
sgi irix 2.3.1
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 8.0
mandrakesoft mandrake linux 8.1
mandrakesoft mandrake linux 8.2