Vulnerability Name:

CVE-2003-0545 (CCN-13315)

Assigned:2003-09-30
Published:2003-09-30
Updated:2018-05-03
Summary:Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-03:18
OpenSSL vulnerabilities in ASN.1 parsing

Source: CCN
Type: SGI Security Advisory 20030904-01-P
Multiple OpenSSH/OpenSSL Vulnerabilities

Source: CCN
Type: SGI Security Advisory 20030904-02-P
Multiple OpenSSH/OpenSSL Vulnerabilities Update

Source: CCN
Type: BugTraq Mailing List, Fri Oct 31 2003 - 12:58:59 CST
VMware GSX Server and ESX Server OpenSSL vulnerability patches

Source: MITRE
Type: CNA
CVE-2003-0545

Source: CCN
Type: AppleCare Knowledge Base Document 61798
Security Update 2003-08-14

Source: CCN
Type: Oracle Security Alert #62
SSL Update for CERT CA200326 and older SSL issues

Source: CCN
Type: RHSA-2003-292
Updated OpenSSL packages fix vulnerabilities

Source: CCN
Type: VulnWatch Mailing List, Tue, 30 Sep 2003 14:52:07 +0000 (GMT)
Vulnerability Issues in OpenSSL

Source: CCN
Type: SA22249
IBM Rational RequisitePro OpenSSL Vulnerability

Source: SECUNIA
Type: Vendor Advisory
22249

Source: CCN
Type: Sun Alert ID: 57100
Sun Linux Multiple Security Vulnerabilities in OpenSSL

Source: CCN
Type: Sun Alert ID: 57444
Sun Grid Engine 5.3 Software May Experience Security Vulnerabilities in OpenSSL

Source: CCN
Type: Sun Alert ID: 57475
SunPlex (Sun Cluster) Multiple Security Vulnerabilities in OpenSSL Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Protocols

Source: CCN
Type: Sun Alert ID: 57498
ASN.1 Parsing Issue May Lead to Denial-of-Service Condition in Sun Java System Web Server and Sun Java

Source: CCN
Type: Sun Alert ID: 57599
ASN1 Decoder For Sun Java System Directory Server May Be Subject to Denial of Service (DoS)

Source: CCN
Type: Novell Technical Information Document TID10087450
Regarding NISCC vulnerability advisory on SSL (secure sockets layer) and TLS -

Source: CONFIRM
Type: UNKNOWN
http://www-1.ibm.com/support/docview.wss?uid=swg21247112

Source: CCN
Type: CERT Advisory CA-2003-26
Multiple Vulnerabilities in SSL/TLS Implementations

Source: CERT
Type: US Government Resource
CA-2003-26

Source: CCN
Type: CIAC Information Bulletin N-159
OpenSSL Security Vulnerabilities in ASN.1 parsing

Source: CCN
Type: cisco-sa-20030930-ssl
Cisco Security Advisory: SSL Implementation Vulnerabilities

Source: DEBIAN
Type: UNKNOWN
DSA-394

Source: DEBIAN
Type: DSA-394
openssl095 -- ASN.1 parsing vulnerability

Source: CCN
Type: Hitachi Security Vulnerability Information HS03-007
Multiple Vulnerabilities in SSL/TLS Implementations

Source: CCN
Type: US-CERT VU#104280
Multiple vulnerabilities in SSL/TLS implementations

Source: CCN
Type: US-CERT VU#935264
OpenSSL ASN.1 parser insecure memory deallocation

Source: CERT-VN
Type: US Government Resource
VU#935264

Source: CCN
Type: Gentoo Linux Security Announcement 200309-19
openssl

Source: CCN
Type: OpenPKG-SA-2003.044
OpenSSL

Source: CCN
Type: OpenSSL Security Advisory [30 September 2003]
Vulnerabilities in ASN.1 parsing

Source: CCN
Type: OSVDB ID: 3684
OpenSSL ASN.1 Client Certificate Double-free

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:292

Source: BID
Type: UNKNOWN
8732

Source: CCN
Type: BID-8732
OpenSSL ASN.1 Parsing Vulnerabilities

Source: MISC
Type: Patch, Vendor Advisory
http://www.uniras.gov.uk/vuls/2003/006489/openssl.htm

Source: VUPEN
Type: UNKNOWN
ADV-2006-3900

Source: XF
Type: UNKNOWN
openssl-asn1-dos(13315)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:2590

Source: SUSE
Type: SUSE-SA:2003:043
openssl: remote denial-of-service

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.2sx:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.2sy:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
  • AND
  • cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.4:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:firewall_services_module:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.20:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:pix_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_4:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_xtr:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11000:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:9.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:9.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:-:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.23:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ciscoworks_1105_hosting_solution_engine:*:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ciscoworks_1105_wireless_lan_solution_engine:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.1(11)e:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:network_analysis_module:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:threat_response:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:sn_5428_storage_router:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ciscoworks_common_management_foundation:-:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:-:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:9.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:sun:cluster:3.0::sparc:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.21f:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_application_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp10:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp11:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp12:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp13:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp2:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp3:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp4:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp5:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp6:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp7:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp8:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:4.1:sp9:*:*:*:*:*:*
  • OR cpe:/a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.10m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.11m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.15m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.16m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.2m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.3m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.4m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.5m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.6m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.7m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.8m:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9f:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.9m:*:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:sun:one_web_server:6.0:sp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20030545
    V
    CVE-2003-0545
    2015-11-16
    oval:org.mitre.oval:def:2590
    V
    OpenSSL Double-free Vulnerability
    2014-08-18
    oval:org.debian:def:394
    V
    ASN.1 parsing vulnerability
    2003-10-11
    BACK
    openssl openssl 0.9.6
    openssl openssl 0.9.7
    openssl openssl 0.9.7a
    openssl openssl 0.9.7
    cisco ios 12.2sx
    cisco ios 12.2sy
    openssl openssl 0.9.7b
    openssl openssl 0.9.7 beta1
    openssl openssl 0.9.7 beta2
    openssl openssl 0.9.7 beta3
    openssl openssl 0.9.7 beta4
    openssl openssl 0.9.7 beta5
    openssl openssl 0.9.7 beta6
    sgi irix 6.0.1
    sgi irix 6.1
    sgi irix 6.2
    sgi irix 6.3
    sgi irix 6.4
    cisco firewall services module *
    sgi irix 6.5
    hp hp-ux 11.00
    sgi irix 6.0
    sgi irix 6.5.1
    sgi irix 6.5.2
    sgi irix 6.5.3
    sgi irix 6.5.4
    freebsd freebsd 4.0
    freebsd freebsd 5.0
    hp hp-ux 11.11
    freebsd freebsd 4.1
    netbsd netbsd 1.5
    oracle database server 8.1.7
    sgi irix 6.5.7
    freebsd freebsd 4.2
    sgi irix 6.5.5
    sgi irix 6.5.6
    sgi irix 6.5.8
    suse suse linux 7.2
    freebsd freebsd 4.3
    conectiva linux 7.0
    netbsd netbsd 1.5.1
    hp hp-ux 11.20
    suse suse linux 7.3
    freebsd freebsd 4.4
    sgi irix 6.5.9
    sgi irix 6.5.10
    sgi irix 6.5.11
    netbsd netbsd 1.5.2
    cisco pix firewall *
    sun cobalt raq 4 *
    suse suse linux firewall *
    suse suse linux database server *
    suse suse email server iii
    suse suse linux connectivity server *
    sun cobalt raq xtr *
    sgi irix 6.5.12
    sgi irix 6.5.13
    sgi irix 6.5.14
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    freebsd freebsd 4.5
    sun solaris 9
    debian debian linux 3.0
    cisco content services switch 11000 *
    freebsd freebsd 4.6
    openpkg openpkg current
    sun one web server 6.0
    sun one web server 4.1
    oracle application server 9.0.2
    sgi irix 6.5.15
    sgi irix 6.5.16
    suse suse linux office server *
    netbsd netbsd 1.5.3
    netbsd netbsd 1.6
    hp hp-ux 11.22
    mandrakesoft mandrake linux 9.0
    suse suse email server 3.1
    suse suse linux 8.1
    suse linux enterprise server 8
    mandrakesoft mandrake multi network firewall 8.2
    netbsd netbsd current
    openpkg openpkg 1.2
    oracle application server 9.0.3
    freebsd freebsd 4.7
    mandrakesoft mandrake linux corporate server 2.1
    freebsd freebsd 4.8
    mandrakesoft mandrake linux 9.1
    redhat linux 9.0
    suse suse linux 8.2
    conectiva linux 9.0
    sgi irix 6.5.19
    hp hp-ux 11.23
    sgi irix 6.5.20
    netbsd netbsd 1.6.1
    openpkg openpkg 1.3
    cisco ciscoworks 1105 hosting solution engine *
    cisco ciscoworks 1105 wireless lan solution engine *
    sgi irix 6.5.21
    cisco ios 12.1(11)e
    cisco network analysis module *
    cisco threat response *
    cisco application and content networking software *
    cisco sn 5428 storage router -
    cisco ciscoworks common management foundation -
    suse suse linux 9.0
    mandrakesoft mandrake linux 9.2
    freebsd freebsd 5.1
    oracle application server 1.0.2.2
    oracle application server 1.0.2.1s
    oracle http server 9.2.0
    oracle http server 9.0.1
    oracle http server 8.1.7
    sun cluster 3.0
    sun one web server 6.1
    sgi irix 6.5.21m
    sgi irix 6.5.21f
    sun one application server 7.0
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux corporate server 2.1
    sun one web server 4.1 sp1
    sun one web server 4.1 sp10
    sun one web server 4.1 sp11
    sun one web server 4.1 sp12
    sun one web server 4.1 sp13
    sun one web server 4.1 sp2
    sun one web server 4.1 sp3
    sun one web server 4.1 sp4
    sun one web server 4.1 sp5
    sun one web server 4.1 sp6
    sun one web server 4.1 sp7
    sun one web server 4.1 sp8
    sun one web server 4.1 sp9
    vmware gsx server 2.5.1
    vmware gsx server 2.5.1_build_5336
    sgi irix 6.5.10f
    sgi irix 6.5.10m
    sgi irix 6.5.11f
    sgi irix 6.5.11m
    sgi irix 6.5.12f
    sgi irix 6.5.12m
    sgi irix 6.5.13f
    sgi irix 6.5.13m
    sgi irix 6.5.14f
    sgi irix 6.5.14m
    sgi irix 6.5.15f
    sgi irix 6.5.15m
    sgi irix 6.5.16f
    sgi irix 6.5.16m
    sgi irix 6.5.17
    sgi irix 6.5.17f
    sgi irix 6.5.17m
    sgi irix 6.5.18
    sgi irix 6.5.18f
    sgi irix 6.5.18m
    sgi irix 6.5.19f
    sgi irix 6.5.19m
    sgi irix 6.5.20f
    sgi irix 6.5.20m
    sgi irix 6.5.2f
    sgi irix 6.5.2m
    sgi irix 6.5.3f
    sgi irix 6.5.3m
    sgi irix 6.5.4f
    sgi irix 6.5.4m
    sgi irix 6.5.5f
    sgi irix 6.5.5m
    sgi irix 6.5.6f
    sgi irix 6.5.6m
    sgi irix 6.5.7f
    sgi irix 6.5.7m
    sgi irix 6.5.8f
    sgi irix 6.5.8m
    sgi irix 6.5.9f
    sgi irix 6.5.9m
    sun one web server 6.0 sp4
    sun one web server 6.0 sp5
    sun one web server 6.0 sp3
    sun one web server 6.0 sp2
    sun one web server 6.0 sp1