Vulnerability Name:

CVE-2003-0078 (CCN-11369)

Assigned:2003-02-19
Published:2003-02-19
Updated:2016-10-18
Summary:ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-03:02.openssl
OpenSSL timing-based SSL/TLS attack

Source: NETBSD
Type: UNKNOWN
NetBSD-SA2003-001

Source: SGI
Type: UNKNOWN
20030501-01-I

Source: CCN
Type: BugTraq Mailing List, Wed Feb 19 2003 - 08:40:36 CST
OpenSSL 0.9.7a and 0.9.6i released

Source: MITRE
Type: CNA
CVE-2003-0078

Source: CONECTIVA
Type: UNKNOWN
CLSA-2003:570

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:570
openssl -- Information leak in encrypted connections

Source: CCN
Type: AppleCare Knowledge Base Document 120195
Mac OS X Server Update 10.2.4: Information and Download

Source: BUGTRAQ
Type: UNKNOWN
20030219 OpenSSL 0.9.7a and 0.9.6i released

Source: BUGTRAQ
Type: UNKNOWN
20030219 [OpenPKG-SA-2003.013] OpenPKG Security Advisory (openssl)

Source: GENTOO
Type: UNKNOWN
GLSA-200302-10

Source: CCN
Type: Oracle Security Alert #62
SSL Update for CERT CA200326 and older SSL issues

Source: CCN
Type: RHSA-2003-062
Updated OpenSSL packages fix timing attack

Source: CCN
Type: RHSA-2003-063
openssl security update

Source: CCN
Type: RHSA-2003-205
Updated OpenSSL packages fix vulnerabilities

Source: CCN
Type: Sun Alert ID: 54147
Security Vulnerability in SSL/TLS Block Ciphers May Affect Sun ONE/iplanet Web Server and Application Server

Source: CCN
Type: Sun Alert ID: 56380
Timing Based Attack Vulnerabilities in the Java Secure Socket Extension

Source: CCN
Type: CIAC Information Bulletin N-051
Red Hat Updated OpenSSL Packages Fix Timing Attack

Source: CIAC
Type: UNKNOWN
N-051

Source: CCN
Type: CIAC Information Bulletin N-141
Timing based attack vulnerabilities in the JAVA Secure Socket Extension

Source: DEBIAN
Type: Vendor Advisory
DSA-253

Source: DEBIAN
Type: DSA-253
openssl -- information leak

Source: CCN
Type: GNU TLS Web site
The GNU Transport Layer Security Library [News]

Source: XF
Type: Vendor Advisory
ssl-cbc-information-leak(11369)

Source: ENGARDE
Type: UNKNOWN
ESA-20030220-005

Source: CCN
Type: EnGarde Secure Linux Security Advisory ESA-20030220-005
OpenSSL timing-based attack vulnerability.

Source: CCN
Type: Gentoo Linux Security Announcement 200302-10
openssl -- timing based attack

Source: CCN
Type: NetBSD Security Advisory 2003-001
Encryption weakness in OpenSSL code

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:020

Source: CCN
Type: OpenPKG-SA-2003.013
OpenSSL

Source: CCN
Type: OpenSSL Security Advisory [19 February 2003]
Timing-based attacks on SSL/TLS with CBC encryption

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.openssl.org/news/secadv_20030219.txt

Source: OSVDB
Type: UNKNOWN
3945

Source: CCN
Type: OSVDB ID: 3945
OpenSSL Vaudenay Timing Attack

Source: REDHAT
Type: UNKNOWN
RHSA-2003:062

Source: REDHAT
Type: UNKNOWN
RHSA-2003:063

Source: REDHAT
Type: UNKNOWN
RHSA-2003:082

Source: REDHAT
Type: UNKNOWN
RHSA-2003:104

Source: REDHAT
Type: UNKNOWN
RHSA-2003:205

Source: BID
Type: UNKNOWN
6884

Source: CCN
Type: BID-6884
OpenSSL CBC Error Information Leakage Weakness

Source: CCN
Type: BID-7024
GNU TLS Library Record Layer Timing Information Leakage Weakness

Source: CCN
Type: Trustix Secure Linux Security Advisory #2003-0005
openssl -- security fix

Source: TRUSTIX
Type: UNKNOWN
2003-0005

Source: CCN
Type: TLSA-2003-10
Timing-based attacks on SSL/TLS with CBC encryption

Source: XF
Type: UNKNOWN
ssl-cbc-information-leak(11369)

Source: SUSE
Type: SUSE-SA:2003:011
openssl: remote attack on encryption

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
  • AND
  • cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_single_network_firewall:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:9.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6.1:release_p10:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:*
  • OR cpe:/a:oracle:application_server:9.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.23:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:9.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_01:*:*:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_02:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/a:sun:one_application_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1::ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:*
  • OR cpe:/a:sun:jsse:1.0.3_03:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030078
    V
    CVE-2003-0078
    2015-11-16
    oval:org.debian:def:253
    V
    information leak
    2003-02-24
    BACK
    openssl openssl 0.9.1c
    openssl openssl 0.9.2b
    openssl openssl 0.9.3
    openssl openssl 0.9.4
    openssl openssl 0.9.5
    openssl openssl 0.9.5a
    openssl openssl 0.9.6
    openssl openssl 0.9.6a
    openssl openssl 0.9.6b
    openssl openssl 0.9.6c
    openssl openssl 0.9.6d
    openssl openssl 0.9.6e
    openssl openssl 0.9.6g
    openssl openssl 0.9.6h
    openssl openssl 0.9.7
    openssl openssl 0.9.7 beta1
    openssl openssl 0.9.7 beta2
    openssl openssl 0.9.7 beta3
    freebsd freebsd 4.2
    freebsd freebsd 4.3
    freebsd freebsd 4.4
    freebsd freebsd 4.5
    freebsd freebsd 4.6
    freebsd freebsd 4.7
    freebsd freebsd 4.8 pre-release
    freebsd freebsd 5.0
    openbsd openbsd 3.1
    openbsd openbsd 3.2
    openssl openssl 0.9.7a
    openssl openssl 0.9.6i
    openssl openssl 0.9.7
    openssl openssl 0.9.6k
    openssl openssl 0.9.6a
    openssl openssl 0.9.7b
    openssl openssl 0.9.7c
    openssl openssl 0.9.1c
    openssl openssl 0.9.2b
    openssl openssl 0.9.3
    openssl openssl 0.9.3a
    openssl openssl 0.9.4
    openssl openssl 0.9.5
    openssl openssl 0.9.5 beta1
    openssl openssl 0.9.5 beta2
    openssl openssl 0.9.5a
    openssl openssl 0.9.5a beta1
    openssl openssl 0.9.5a beta2
    openssl openssl 0.9.6
    openssl openssl 0.9.6 beta1
    openssl openssl 0.9.6 beta2
    openssl openssl 0.9.6 beta3
    openssl openssl 0.9.6a beta1
    openssl openssl 0.9.6a beta2
    openssl openssl 0.9.6a beta3
    openssl openssl 0.9.6b
    openssl openssl 0.9.6c
    openssl openssl 0.9.6d
    openssl openssl 0.9.6e
    openssl openssl 0.9.6f
    openssl openssl 0.9.6g
    openssl openssl 0.9.6h
    openssl openssl 0.9.6j
    openssl openssl 0.9.6l
    openssl openssl 0.9.6m
    openssl openssl 0.9.7 beta1
    openssl openssl 0.9.7 beta2
    openssl openssl 0.9.7 beta3
    openssl openssl 0.9.7 beta4
    openssl openssl 0.9.7 beta5
    openssl openssl 0.9.7 beta6
    openssl openssl 0.9.7d
    hp hp-ux 11.00
    redhat linux 6.2
    freebsd freebsd 4.0
    debian debian linux 2.2
    trustix secure linux 1.1
    redhat linux 7
    freebsd freebsd 4.1.1
    hp hp-ux 11.11
    freebsd freebsd 4.1
    mandrakesoft mandrake linux 7.2
    netbsd netbsd 1.5
    oracle database server 8.1.7
    conectiva linux 6.0
    freebsd freebsd 4.2
    suse suse linux 7.1
    redhat linux 7.1
    trustix secure linux 1.2
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake single network firewall 7.2
    turbolinux turbolinux server 6.5
    suse suse linux 7.2
    freebsd freebsd 4.3
    conectiva linux 7.0
    trustix secure linux 1.5
    netbsd netbsd 1.5.1
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    suse suse linux 7.3
    freebsd freebsd 4.4
    netbsd netbsd 1.5.2
    engardelinux secure linux -
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux connectivity server *
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    freebsd freebsd 4.5
    debian debian linux 3.0
    freebsd freebsd 4.6
    openpkg openpkg current
    oracle application server 9.0.2
    gentoo linux *
    freebsd freebsd 4.6.1 release_p10
    suse suse linux office server *
    netbsd netbsd 1.5.3
    netbsd netbsd 1.6
    redhat linux 8.0
    openpkg openpkg 1.1
    hp hp-ux 11.22
    mandrakesoft mandrake linux 9.0
    suse suse email server 3.1
    suse suse linux 8.1
    suse linux enterprise server 8
    mandrakesoft mandrake multi network firewall 8.2
    netbsd netbsd current
    turbolinux turbolinux server 6.1
    openpkg openpkg 1.2
    turbolinux turbolinux workstation 6.0
    oracle application server 9.0.3
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    hp hp-ux 11.23
    oracle application server 1.0.2.2
    oracle application server 1.0.2.1s
    oracle http server 9.2.0
    oracle http server 9.0.1
    oracle http server 8.1.7
    sun jsse 1.0.3
    sun jsse 1.0.3_01
    sun jsse 1.0.3_02
    redhat linux advanced workstation 2.1
    sun one application server 7.0
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux 8.1
    mandrakesoft mandrake linux 8.2
    sun jsse 1.0.3_03
    sun one web server 6.0 sp4
    sun one web server 6.0 sp5
    sun one web server 6.0 sp3
    sun one web server 6.0 sp2
    sun one web server 6.0 sp1