Vulnerability Name:

CVE-2003-0028 (CCN-11563)

Assigned:2003-03-16
Published:2003-03-16
Updated:2020-01-21
Summary:Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: NETBSD
Type: UNKNOWN
NetBSD-SA2003-008

Source: CCN
Type: SCO Security Advisory CSSA-2003-013.0
Linux: integer overflow vulnerability in XDR/RPC routines

Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-03:05.xdr
remote denial-of-service in XDR encoder/decoder

Source: VULNWATCH
Type: UNKNOWN
20030319 EEYE: XDR Integer Overflow

Source: MITRE
Type: CNA
CVE-2003-0028

Source: CCN
Type: Connectiva Linux Security Announcement CLSA-2003:633
glibc

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:639
krb5

Source: BUGTRAQ
Type: UNKNOWN
20030319 EEYE: XDR Integer Overflow

Source: BUGTRAQ
Type: UNKNOWN
20030319 MITKRB5-SA-2003-003: faulty length checks in xdrmem_getbytes

Source: BUGTRAQ
Type: UNKNOWN
20030325 GLSA: glibc (200303-22)

Source: TRUSTIX
Type: UNKNOWN
2003-0014

Source: BUGTRAQ
Type: UNKNOWN
20030522 [slackware-security] glibc XDR overflow fix (SSA:2003-141-03)

Source: CCN
Type: RHSA-2003-051
Updated kerberos packages fix various vulnerabilities

Source: CCN
Type: RHSA-2003-052
krb5 security update

Source: CCN
Type: RHSA-2003-089
Updated glibc packages fix vulnerabilities in RPC XDR decoder

Source: CCN
Type: RHSA-2003-090
glibc security update

Source: CCN
Type: RHSA-2003-091
Updated kerberos packages fix various vulnerabilities

Source: CCN
Type: RHSA-2003-168
Updated kerberos packages fix various vulnerabilities

Source: CCN
Type: RHSA-2003-212
Updated glibc packages fix vulnerabilities

Source: CCN
Type: Sun Alert ID: 51884
Security Vulnerability in the Network Services Library, libnsl(3LIB), Affecting rpcbind

Source: CCN
Type: MIT krb5 Security Advisory 2003-003
Topic: faulty length checks in xdrmem_getbytes

Source: CCN
Type: MIT krb5 Release 1.2 Web site
Kerberos 5 Release 1.2

Source: CCN
Type: CERT Advisory CA-2003-10
Integer overflow in Sun RPC XDR library routines

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-2003-10

Source: CCN
Type: CIAC Information Bulletin N-059
Integer overflow in Sun RPC XDR library routines

Source: DEBIAN
Type: UNKNOWN
DSA-266

Source: DEBIAN
Type: UNKNOWN
DSA-272

Source: DEBIAN
Type: UNKNOWN
DSA-282

Source: DEBIAN
Type: DSA-266
krb5 -- several vulnerabilities

Source: DEBIAN
Type: DSA-272
dietlibc -- integer overflow

Source: DEBIAN
Type: DSA-282
glibc -- integer overflow

Source: CCN
Type: eEye Digital Security Web site
eEye Digital Security

Source: EEYE
Type: Exploit, Vendor Advisory
AD20030318

Source: CCN
Type: US-CERT VU#516825
Integer overflow in Sun RPC XDR library routines

Source: CERT-VN
Type: US Government Resource
VU#516825

Source: ENGARDE
Type: UNKNOWN
ESA-20030321-010

Source: CCN
Type: EnGarde Secure Linux Security Advisory ESA-20030321-010
RPC XDR decoder vulnerability.

Source: CCN
Type: Gentoo Linux Security Announcement 200303-22
glibc integer overflow

Source: CCN
Type: Trustix Secure Linux Security Advisory #2003-0014
glibc

Source: CCN
Type: Gentoo Linux Security Announcement 200303-28
krb5 & mit-krb5

Source: CCN
Type: Gentoo Linux Security Announcement 200303-29
dietlibc

Source: CCN
Type: Immunix OS Security Advisory IMNX-2003-7+-007-01
Kerberos 5

Source: CCN
Type: Immunix OS Security Advisory IMNX-2003-7+-009-01
glibc

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:037

Source: SUSE
Type: UNKNOWN
SuSE-SA:2003:027

Source: REDHAT
Type: UNKNOWN
RHSA-2003:051

Source: REDHAT
Type: UNKNOWN
RHSA-2003:052

Source: REDHAT
Type: UNKNOWN
RHSA-2003:089

Source: REDHAT
Type: UNKNOWN
RHSA-2003:091

Source: BUGTRAQ
Type: UNKNOWN
20030319 RE: EEYE: XDR Integer Overflow

Source: BUGTRAQ
Type: UNKNOWN
20030331 GLSA: dietlibc (200303-29)

Source: BUGTRAQ
Type: UNKNOWN
20030331 GLSA: krb5 & mit-krb5 (200303-28)

Source: CCN
Type: BID-7123
Sun XDR Library xdrmem_getbytes() Integer Overflow Vulnerability

Source: CCN
Type: BID-7249
Multiple HP Tru64 C Library Vulnerabilities

Source: CCN
Type: slackware-security Mailing List, Tue May 20 20:13:09 PDT 2003
[slackware-security] glibc XDR overflow fix (SSA:2003-141-03)

Source: CCN
Type: TLSA-2003-23
Integer overflow in Sun RPC XDR library routines

Source: CCN
Type: TLSA-2003-29
Multiple vulnerabilities in krb5

Source: XF
Type: UNKNOWN
sunrpc-xdrmemgetbytes-integer-overflow(11563)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:230

Source: CONFIRM
Type: UNKNOWN
https://security.netapp.com/advisory/ntap-20150122-0002/

Source: SUSE
Type: SUSE-SA:2003:023
sendmail: local/remote privilege escalation

Source: SUSE
Type: SUSE-SA:2003:027
glibc: remote system compromise

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnu:glibc:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.0.4a:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.1.1a:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2.2a:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2.2b:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:openafs:openafs:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:cray:unicos:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:6.0e:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:8.3:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:9.0.2.5:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:cray:unicos:9.2.4:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.24:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.20:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux_series_700:10.20:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux_series_800:10.20:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.3:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.8:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.9:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:2.5.1:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:7.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9.0:*:sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:sunos:-:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:sun:solaris:2.6::sparc:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*
  • OR cpe:/a:gnu:glibc:*:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:libc:-:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:7.0::sparc:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
  • AND
  • cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.26:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:*
  • OR cpe:/o:ibm:aix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:-:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1::ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:230
    V
    xdrmem_bytes() Integer Overflow Vulnerability
    2007-04-25
    oval:org.debian:def:282
    V
    integer overflow
    2003-04-09
    oval:org.debian:def:272
    V
    integer overflow
    2003-03-28
    oval:org.debian:def:266
    V
    several vulnerabilities
    2003-03-24
    BACK
    gnu glibc 2.1
    gnu glibc 2.1.1
    gnu glibc 2.1.2
    gnu glibc 2.1.3
    gnu glibc 2.2
    gnu glibc 2.2.1
    gnu glibc 2.2.2
    gnu glibc 2.2.3
    gnu glibc 2.2.4
    gnu glibc 2.2.5
    gnu glibc 2.3
    gnu glibc 2.3.1
    gnu glibc 2.3.2
    mit kerberos 5 1.2
    mit kerberos 5 1.2.1
    mit kerberos 5 1.2.2
    mit kerberos 5 1.2.3
    mit kerberos 5 1.2.4
    mit kerberos 5 1.2.5
    mit kerberos 5 1.2.6
    mit kerberos 5 1.2.7
    openafs openafs 1.0
    openafs openafs 1.0.1
    openafs openafs 1.0.2
    openafs openafs 1.0.3
    openafs openafs 1.0.4
    openafs openafs 1.0.4a
    openafs openafs 1.1
    openafs openafs 1.1.1
    openafs openafs 1.1.1a
    openafs openafs 1.2
    openafs openafs 1.2.1
    openafs openafs 1.2.2
    openafs openafs 1.2.2a
    openafs openafs 1.2.2b
    openafs openafs 1.2.3
    openafs openafs 1.2.4
    openafs openafs 1.2.5
    openafs openafs 1.2.6
    openafs openafs 1.3
    openafs openafs 1.3.1
    openafs openafs 1.3.2
    sgi irix 6.5
    sgi irix 6.5.1
    sgi irix 6.5.2
    sgi irix 6.5.2f
    sgi irix 6.5.2m
    sgi irix 6.5.3
    sgi irix 6.5.3f
    sgi irix 6.5.3m
    sgi irix 6.5.4
    sgi irix 6.5.4f
    sgi irix 6.5.4m
    sgi irix 6.5.5
    sgi irix 6.5.5f
    sgi irix 6.5.5m
    sgi irix 6.5.6
    sgi irix 6.5.6f
    sgi irix 6.5.6m
    sgi irix 6.5.7
    sgi irix 6.5.7f
    sgi irix 6.5.7m
    sgi irix 6.5.8
    sgi irix 6.5.8f
    sgi irix 6.5.8m
    sgi irix 6.5.9
    sgi irix 6.5.9f
    sgi irix 6.5.9m
    sgi irix 6.5.10
    sgi irix 6.5.10f
    sgi irix 6.5.10m
    sgi irix 6.5.11
    sgi irix 6.5.11f
    sgi irix 6.5.11m
    sgi irix 6.5.12
    sgi irix 6.5.12f
    sgi irix 6.5.12m
    sgi irix 6.5.13
    sgi irix 6.5.13f
    sgi irix 6.5.13m
    sgi irix 6.5.14
    sgi irix 6.5.14f
    sgi irix 6.5.14m
    sgi irix 6.5.15
    sgi irix 6.5.15f
    sgi irix 6.5.15m
    sgi irix 6.5.16
    sgi irix 6.5.16f
    sgi irix 6.5.16m
    sgi irix 6.5.17
    sgi irix 6.5.17f
    sgi irix 6.5.17m
    sgi irix 6.5.18
    sgi irix 6.5.18f
    sgi irix 6.5.18m
    sgi irix 6.5.19
    sgi irix 6.5.20
    cray unicos 6.0
    cray unicos 6.0e
    cray unicos 6.1
    cray unicos 7.0
    cray unicos 8.0
    cray unicos 8.3
    cray unicos 9.0
    cray unicos 9.0.2.5
    cray unicos 9.2
    cray unicos 9.2.4
    freebsd freebsd 4.0
    freebsd freebsd 4.1
    freebsd freebsd 4.1.1
    freebsd freebsd 4.1.1 release
    freebsd freebsd 4.1.1 stable
    freebsd freebsd 4.2
    freebsd freebsd 4.2 stable
    freebsd freebsd 4.3
    freebsd freebsd 4.3 release
    freebsd freebsd 4.3 stable
    freebsd freebsd 4.4
    freebsd freebsd 4.4 stable
    freebsd freebsd 4.5
    freebsd freebsd 4.5 release
    freebsd freebsd 4.5 stable
    freebsd freebsd 4.6
    freebsd freebsd 4.6 release
    freebsd freebsd 4.6 stable
    freebsd freebsd 4.6.2
    freebsd freebsd 4.7
    freebsd freebsd 4.7 release
    freebsd freebsd 4.7 stable
    freebsd freebsd 5.0
    hp hp-ux 10.20
    hp hp-ux 10.24
    hp hp-ux 11.00
    hp hp-ux 11.04
    hp hp-ux 11.11
    hp hp-ux 11.20
    hp hp-ux 11.22
    hp hp-ux series 700 10.20
    hp hp-ux series 800 10.20
    ibm aix 4.3.3
    ibm aix 5.1
    ibm aix 5.2
    openbsd openbsd 2.0
    openbsd openbsd 2.1
    openbsd openbsd 2.2
    openbsd openbsd 2.3
    openbsd openbsd 2.4
    openbsd openbsd 2.5
    openbsd openbsd 2.6
    openbsd openbsd 2.7
    openbsd openbsd 2.8
    openbsd openbsd 2.9
    openbsd openbsd 3.0
    openbsd openbsd 3.1
    openbsd openbsd 3.2
    sun solaris 2.5.1
    sun solaris 2.6
    sun solaris 7.0
    sun solaris 8.0
    sun solaris 9.0
    sun solaris 9.0
    sun sunos -
    sun sunos 5.5.1
    sun sunos 5.7
    sun sunos 5.8
    sun solaris 2.6
    hp hp-ux 10.20
    sun solaris 8
    sun solaris 9
    gnu glibc *
    gnu libc -
    sun solaris 7.0
    mit kerberos 5-1.2.2
    mit kerberos 5-1.2
    mit kerberos 5-1.2.1
    mit kerberos 5-1.2.3
    mit kerberos 5-1.2.4
    mit kerberos 5-1.2.5
    mit kerberos 5-1.2.6
    mit kerberos 5-1.2.7
    hp hp-ux 11.00
    redhat linux 6.2
    hp hp-ux 11.04
    debian debian linux 2.2
    freebsd freebsd 5.0
    trustix secure linux 1.1
    redhat linux 7
    hp hp-ux 11.11
    mandrakesoft mandrake linux 7.2
    hp hp-ux 10.26
    conectiva linux 6.0
    suse suse linux 7.1
    ibm aix 5.1
    redhat linux 7.1
    trustix secure linux 1.2
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake single network firewall 7.2
    turbolinux turbolinux server 6.5
    suse suse linux 7.2
    conectiva linux 7.0
    trustix secure linux 1.5
    ibm aix 4.3.3
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    suse suse linux 7.3
    engardelinux secure linux -
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux connectivity server *
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    freebsd freebsd 4.6
    slackware slackware linux 8.1
    gentoo linux *
    suse suse linux office server *
    redhat linux 8.0
    hp hp-ux 11.22
    mandrakesoft mandrake linux 9.0
    suse suse email server 3.1
    suse suse linux 8.1
    mandrakesoft mandrake multi network firewall 8.2
    turbolinux turbolinux server 6.1
    turbolinux turbolinux workstation 6.0
    ibm aix 5.2
    freebsd freebsd 4.7
    mandrakesoft mandrake linux corporate server 2.1
    freebsd freebsd 4.8
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat linux 9.0
    slackware slackware linux 9.0
    conectiva linux 9.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux 8.1
    mandrakesoft mandrake linux 8.2
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux corporate server 2.1