Vulnerability Name: CVE-2003-0028 (CCN-11563) Assigned: 2003-03-16 Published: 2003-03-16 Updated: 2020-01-21 Summary: Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391 . CVSS v3 Severity: 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: NETBSD Type: UNKNOWNNetBSD-SA2003-008 Source: CCN Type: SCO Security Advisory CSSA-2003-013.0Linux: integer overflow vulnerability in XDR/RPC routines Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-03:05.xdrremote denial-of-service in XDR encoder/decoder Source: VULNWATCH Type: UNKNOWN20030319 EEYE: XDR Integer Overflow Source: MITRE Type: CNACVE-2003-0028 Source: CCN Type: Connectiva Linux Security Announcement CLSA-2003:633glibc Source: CCN Type: Conectiva Linux Security Announcement CLSA-2003:639krb5 Source: BUGTRAQ Type: UNKNOWN20030319 EEYE: XDR Integer Overflow Source: BUGTRAQ Type: UNKNOWN20030319 MITKRB5-SA-2003-003: faulty length checks in xdrmem_getbytes Source: BUGTRAQ Type: UNKNOWN20030325 GLSA: glibc (200303-22) Source: TRUSTIX Type: UNKNOWN2003-0014 Source: BUGTRAQ Type: UNKNOWN20030522 [slackware-security] glibc XDR overflow fix (SSA:2003-141-03) Source: CCN Type: RHSA-2003-051Updated kerberos packages fix various vulnerabilities Source: CCN Type: RHSA-2003-052krb5 security update Source: CCN Type: RHSA-2003-089Updated glibc packages fix vulnerabilities in RPC XDR decoder Source: CCN Type: RHSA-2003-090glibc security update Source: CCN Type: RHSA-2003-091Updated kerberos packages fix various vulnerabilities Source: CCN Type: RHSA-2003-168Updated kerberos packages fix various vulnerabilities Source: CCN Type: RHSA-2003-212Updated glibc packages fix vulnerabilities Source: CCN Type: Sun Alert ID: 51884Security Vulnerability in the Network Services Library, libnsl(3LIB), Affecting rpcbind Source: CCN Type: MIT krb5 Security Advisory 2003-003Topic: faulty length checks in xdrmem_getbytes Source: CCN Type: MIT krb5 Release 1.2 Web siteKerberos 5 Release 1.2 Source: CCN Type: CERT Advisory CA-2003-10Integer overflow in Sun RPC XDR library routines Source: CERT Type: Patch, Third Party Advisory, US Government ResourceCA-2003-10 Source: CCN Type: CIAC Information Bulletin N-059Integer overflow in Sun RPC XDR library routines Source: DEBIAN Type: UNKNOWNDSA-266 Source: DEBIAN Type: UNKNOWNDSA-272 Source: DEBIAN Type: UNKNOWNDSA-282 Source: DEBIAN Type: DSA-266krb5 -- several vulnerabilities Source: DEBIAN Type: DSA-272dietlibc -- integer overflow Source: DEBIAN Type: DSA-282glibc -- integer overflow Source: CCN Type: eEye Digital Security Web siteeEye Digital Security Source: EEYE Type: Exploit, Vendor AdvisoryAD20030318 Source: CCN Type: US-CERT VU#516825Integer overflow in Sun RPC XDR library routines Source: CERT-VN Type: US Government ResourceVU#516825 Source: ENGARDE Type: UNKNOWNESA-20030321-010 Source: CCN Type: EnGarde Secure Linux Security Advisory ESA-20030321-010RPC XDR decoder vulnerability. Source: CCN Type: Gentoo Linux Security Announcement 200303-22glibc integer overflow Source: CCN Type: Trustix Secure Linux Security Advisory #2003-0014glibc Source: CCN Type: Gentoo Linux Security Announcement 200303-28krb5 & mit-krb5 Source: CCN Type: Gentoo Linux Security Announcement 200303-29dietlibc Source: CCN Type: Immunix OS Security Advisory IMNX-2003-7+-007-01Kerberos 5 Source: CCN Type: Immunix OS Security Advisory IMNX-2003-7+-009-01glibc Source: MANDRAKE Type: UNKNOWNMDKSA-2003:037 Source: SUSE Type: UNKNOWNSuSE-SA:2003:027 Source: REDHAT Type: UNKNOWNRHSA-2003:051 Source: REDHAT Type: UNKNOWNRHSA-2003:052 Source: REDHAT Type: UNKNOWNRHSA-2003:089 Source: REDHAT Type: UNKNOWNRHSA-2003:091 Source: BUGTRAQ Type: UNKNOWN20030319 RE: EEYE: XDR Integer Overflow Source: BUGTRAQ Type: UNKNOWN20030331 GLSA: dietlibc (200303-29) Source: BUGTRAQ Type: UNKNOWN20030331 GLSA: krb5 & mit-krb5 (200303-28) Source: CCN Type: BID-7123Sun XDR Library xdrmem_getbytes() Integer Overflow Vulnerability Source: CCN Type: BID-7249Multiple HP Tru64 C Library Vulnerabilities Source: CCN Type: slackware-security Mailing List, Tue May 20 20:13:09 PDT 2003 [slackware-security] glibc XDR overflow fix (SSA:2003-141-03) Source: CCN Type: TLSA-2003-23Integer overflow in Sun RPC XDR library routines Source: CCN Type: TLSA-2003-29Multiple vulnerabilities in krb5 Source: XF Type: UNKNOWNsunrpc-xdrmemgetbytes-integer-overflow(11563) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:230 Source: CONFIRM Type: UNKNOWNhttps://security.netapp.com/advisory/ntap-20150122-0002/ Source: SUSE Type: SUSE-SA:2003:023sendmail: local/remote privilege escalation Source: SUSE Type: SUSE-SA:2003:027glibc: remote system compromise Vulnerable Configuration: Configuration 1 :cpe:/a:gnu:glibc:2.1:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.1.1:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.1.2:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.1.3:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.2:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.2.1:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.2.2:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.2.3:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.2.4:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.2.5:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.3:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.3.1:*:*:*:*:*:*:* OR cpe:/a:gnu:glibc:2.3.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.0:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.0.1:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.0.2:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.0.3:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.0.4:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.0.4a:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.1:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.1.1:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.1.1a:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2.1:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2.2:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2.2a:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2.2b:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2.3:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2.4:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2.5:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.2.6:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.3:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.3.1:*:*:*:*:*:*:* OR cpe:/a:openafs:openafs:1.3.2:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.1:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.2:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.2f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.2m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.3:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.3f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.3m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.4:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.4f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.4m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.5:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.5f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.5m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.6:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.6f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.6m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.7:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.7f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.7m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.8:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.8f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.8m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.9:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.9f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.9m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.10:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.10f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.10m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.11:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.11f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.11m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.12f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.12m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.13f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.13m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.14f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.14m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.15:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.15f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.15m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.16:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.16f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.16m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.17:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.17f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.17m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.18:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.18f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.18m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.19:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.20:*:*:*:*:*:*:* Configuration 2 :cpe:/o:cray:unicos:6.0:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:6.0e:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:6.1:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:7.0:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:8.0:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:8.3:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:9.0:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:9.0.2.5:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:9.2:*:*:*:*:*:*:* OR cpe:/o:cray:unicos:9.2.4:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.2:stable:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.3:release:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.3:stable:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.4:stable:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.5:release:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.5:stable:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.6:release:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.6:stable:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.6.2:-:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.7:release:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.7:stable:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:10.24:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.20:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux_series_700:10.20:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux_series_800:10.20:*:*:*:*:*:*:* OR cpe:/o:ibm:aix:4.3.3:*:*:*:*:*:*:* OR cpe:/o:ibm:aix:5.1:*:*:*:*:*:*:* OR cpe:/o:ibm:aix:5.2:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.0:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.1:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.2:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.3:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.4:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.5:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.6:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.7:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.8:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:2.9:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:3.0:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:3.1:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:3.2:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:2.5.1:*:x86:*:*:*:*:* OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:7.0:*:x86:*:*:*:*:* OR cpe:/o:sun:solaris:8.0:*:x86:*:*:*:*:* OR cpe:/o:sun:solaris:9.0:*:sparc:*:*:*:*:* OR cpe:/o:sun:solaris:9.0:*:x86:*:*:*:*:* OR cpe:/o:sun:sunos:-:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:sun:solaris:2.6::sparc:*:*:*:*:* OR cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:* OR cpe:/a:gnu:glibc:*:*:*:*:*:*:*:* OR cpe:/a:gnu:libc:-:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:7.0::sparc:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:* AND cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:10.26:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:ibm:aix:5.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:* OR cpe:/o:ibm:aix:4.3.3:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:* OR cpe:/o:ibm:aix:5.2:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.8:-:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0::ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1::ia64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
gnu glibc 2.1
gnu glibc 2.1.1
gnu glibc 2.1.2
gnu glibc 2.1.3
gnu glibc 2.2
gnu glibc 2.2.1
gnu glibc 2.2.2
gnu glibc 2.2.3
gnu glibc 2.2.4
gnu glibc 2.2.5
gnu glibc 2.3
gnu glibc 2.3.1
gnu glibc 2.3.2
mit kerberos 5 1.2
mit kerberos 5 1.2.1
mit kerberos 5 1.2.2
mit kerberos 5 1.2.3
mit kerberos 5 1.2.4
mit kerberos 5 1.2.5
mit kerberos 5 1.2.6
mit kerberos 5 1.2.7
openafs openafs 1.0
openafs openafs 1.0.1
openafs openafs 1.0.2
openafs openafs 1.0.3
openafs openafs 1.0.4
openafs openafs 1.0.4a
openafs openafs 1.1
openafs openafs 1.1.1
openafs openafs 1.1.1a
openafs openafs 1.2
openafs openafs 1.2.1
openafs openafs 1.2.2
openafs openafs 1.2.2a
openafs openafs 1.2.2b
openafs openafs 1.2.3
openafs openafs 1.2.4
openafs openafs 1.2.5
openafs openafs 1.2.6
openafs openafs 1.3
openafs openafs 1.3.1
openafs openafs 1.3.2
sgi irix 6.5
sgi irix 6.5.1
sgi irix 6.5.2
sgi irix 6.5.2f
sgi irix 6.5.2m
sgi irix 6.5.3
sgi irix 6.5.3f
sgi irix 6.5.3m
sgi irix 6.5.4
sgi irix 6.5.4f
sgi irix 6.5.4m
sgi irix 6.5.5
sgi irix 6.5.5f
sgi irix 6.5.5m
sgi irix 6.5.6
sgi irix 6.5.6f
sgi irix 6.5.6m
sgi irix 6.5.7
sgi irix 6.5.7f
sgi irix 6.5.7m
sgi irix 6.5.8
sgi irix 6.5.8f
sgi irix 6.5.8m
sgi irix 6.5.9
sgi irix 6.5.9f
sgi irix 6.5.9m
sgi irix 6.5.10
sgi irix 6.5.10f
sgi irix 6.5.10m
sgi irix 6.5.11
sgi irix 6.5.11f
sgi irix 6.5.11m
sgi irix 6.5.12
sgi irix 6.5.12f
sgi irix 6.5.12m
sgi irix 6.5.13
sgi irix 6.5.13f
sgi irix 6.5.13m
sgi irix 6.5.14
sgi irix 6.5.14f
sgi irix 6.5.14m
sgi irix 6.5.15
sgi irix 6.5.15f
sgi irix 6.5.15m
sgi irix 6.5.16
sgi irix 6.5.16f
sgi irix 6.5.16m
sgi irix 6.5.17
sgi irix 6.5.17f
sgi irix 6.5.17m
sgi irix 6.5.18
sgi irix 6.5.18f
sgi irix 6.5.18m
sgi irix 6.5.19
sgi irix 6.5.20
cray unicos 6.0
cray unicos 6.0e
cray unicos 6.1
cray unicos 7.0
cray unicos 8.0
cray unicos 8.3
cray unicos 9.0
cray unicos 9.0.2.5
cray unicos 9.2
cray unicos 9.2.4
freebsd freebsd 4.0
freebsd freebsd 4.1
freebsd freebsd 4.1.1
freebsd freebsd 4.1.1 release
freebsd freebsd 4.1.1 stable
freebsd freebsd 4.2
freebsd freebsd 4.2 stable
freebsd freebsd 4.3
freebsd freebsd 4.3 release
freebsd freebsd 4.3 stable
freebsd freebsd 4.4
freebsd freebsd 4.4 stable
freebsd freebsd 4.5
freebsd freebsd 4.5 release
freebsd freebsd 4.5 stable
freebsd freebsd 4.6
freebsd freebsd 4.6 release
freebsd freebsd 4.6 stable
freebsd freebsd 4.6.2
freebsd freebsd 4.7
freebsd freebsd 4.7 release
freebsd freebsd 4.7 stable
freebsd freebsd 5.0
hp hp-ux 10.20
hp hp-ux 10.24
hp hp-ux 11.00
hp hp-ux 11.04
hp hp-ux 11.11
hp hp-ux 11.20
hp hp-ux 11.22
hp hp-ux series 700 10.20
hp hp-ux series 800 10.20
ibm aix 4.3.3
ibm aix 5.1
ibm aix 5.2
openbsd openbsd 2.0
openbsd openbsd 2.1
openbsd openbsd 2.2
openbsd openbsd 2.3
openbsd openbsd 2.4
openbsd openbsd 2.5
openbsd openbsd 2.6
openbsd openbsd 2.7
openbsd openbsd 2.8
openbsd openbsd 2.9
openbsd openbsd 3.0
openbsd openbsd 3.1
openbsd openbsd 3.2
sun solaris 2.5.1
sun solaris 2.6
sun solaris 7.0
sun solaris 8.0
sun solaris 9.0
sun solaris 9.0
sun sunos -
sun sunos 5.5.1
sun sunos 5.7
sun sunos 5.8
sun solaris 2.6
hp hp-ux 10.20
sun solaris 8
sun solaris 9
gnu glibc *
gnu libc -
sun solaris 7.0
mit kerberos 5-1.2.2
mit kerberos 5-1.2
mit kerberos 5-1.2.1
mit kerberos 5-1.2.3
mit kerberos 5-1.2.4
mit kerberos 5-1.2.5
mit kerberos 5-1.2.6
mit kerberos 5-1.2.7
hp hp-ux 11.00
redhat linux 6.2
hp hp-ux 11.04
debian debian linux 2.2
freebsd freebsd 5.0
trustix secure linux 1.1
redhat linux 7
hp hp-ux 11.11
mandrakesoft mandrake linux 7.2
hp hp-ux 10.26
conectiva linux 6.0
suse suse linux 7.1
ibm aix 5.1
redhat linux 7.1
trustix secure linux 1.2
mandrakesoft mandrake linux 8.0
mandrakesoft mandrake single network firewall 7.2
turbolinux turbolinux server 6.5
suse suse linux 7.2
conectiva linux 7.0
trustix secure linux 1.5
ibm aix 4.3.3
mandrakesoft mandrake linux 8.1
redhat linux 7.2
suse suse linux 7.3
engardelinux secure linux -
suse suse linux firewall *
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0
redhat linux 7.3
debian debian linux 3.0
freebsd freebsd 4.6
slackware slackware linux 8.1
gentoo linux *
suse suse linux office server *
redhat linux 8.0
hp hp-ux 11.22
mandrakesoft mandrake linux 9.0
suse suse email server 3.1
suse suse linux 8.1
mandrakesoft mandrake multi network firewall 8.2
turbolinux turbolinux server 6.1
turbolinux turbolinux workstation 6.0
ibm aix 5.2
freebsd freebsd 4.7
mandrakesoft mandrake linux corporate server 2.1
freebsd freebsd 4.8
mandrakesoft mandrake linux 9.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat linux 9.0
slackware slackware linux 9.0
conectiva linux 9.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 8.0
mandrakesoft mandrake linux 8.1
mandrakesoft mandrake linux 8.2
mandrakesoft mandrake linux 9.1
mandrakesoft mandrake linux corporate server 2.1