Vulnerability Name: CVE-2003-0693 (CCN-13191) Assigned: 2003-09-16 Published: 2003-09-16 Updated: 2018-05-03 Summary: A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695 . CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-03:12OpenSSH buffer management error Source: CCN Type: SCO Security Advisory CSSA-2003-027.0OpenLinux: OpenSSH: multiple buffer handling problems Source: CCN Type: SGI Security Advisory 20030904-01-PMultiple OpenSSH/OpenSSL Vulnerabilities Source: CCN Type: SGI Security Advisory 20030904-02-PMultiple OpenSSH/OpenSSL Vulnerabilities Update Source: CCN Type: SGI Security Advisory 20031001-01-USGI Advanced Linux Environment security update #2 Source: CCN Type: Full-Disclosure Mailing List, Mon Sep 15 2003 - 18:31:56 CDTopenssh remote exploit Source: MITRE Type: CNACVE-2003-0693 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2003:739openssh Source: CCN Type: AppleCare Knowledge Base Document 61798Security Update 2003-08-14 Source: FULLDISC Type: UNKNOWN20030915 new ssh exploit? Source: FULLDISC Type: UNKNOWN20030915 openssh remote exploit Source: FULLDISC Type: UNKNOWN20030916 The lowdown on SSH vulnerability Source: BUGTRAQ Type: UNKNOWN20030916 OpenSSH Buffer Management Bug Advisory Source: REDHAT Type: UNKNOWNRHSA-2003:279 Source: BUGTRAQ Type: UNKNOWN20030916 [slackware-security] OpenSSH Security Advisory (SSA:2003-259-01) Source: TRUSTIX Type: UNKNOWN2003-0033 Source: BUGTRAQ Type: UNKNOWN20030917 [OpenPKG-SA-2003.040] OpenPKG Security Advisory (openssh) Source: CCN Type: RHSA-2003-279Updated OpenSSH packages fix potential vulnerabilities Source: CCN Type: RHSA-2003-280openssh security update Source: CCN Type: Sun Alert ID: 56861Secure Shell Daemon (sshd(1M)) Buffer Management Security Vulnerability Source: SUNALERT Type: UNKNOWN1000620 Source: CCN Type: CERT Advisory CA-2003-24Buffer Management Vulnerability in OpenSSH Source: CERT Type: US Government ResourceCA-2003-24 Source: CCN Type: CIAC Information Bulletin N-151OpenSSH Buffer Management Error Source: CCN Type: CIAC Information Bulletin O-030Hewlett Packard VirtualVault OpenSSH Vulnerabilities Source: CCN Type: Cisco Systems Inc. Security Advisory, 2003 September 17 0700 GMTOpenSSH Server Vulnerabilities Source: DEBIAN Type: UNKNOWNDSA-382 Source: DEBIAN Type: UNKNOWNDSA-383 Source: DEBIAN Type: DSA-382ssh -- possible remote vulnerability Source: DEBIAN Type: DSA-383ssh-krb5 -- possible remote vulnerability Source: CCN Type: US-CERT VU#333628OpenSSH contains buffer management errors Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#333628 Source: CCN Type: Guardian Digital Security Advisory ESA-20030916-023 OpenSSH buffer management error. Source: CCN Type: Immunix Secured OS Security Advisory IMNX-2003-7+-020-01openssh Source: CCN Type: Gentoo Linux Security Announcement 200309-11openssh Source: CCN Type: Immunix Secured OS Security Advisory IMNX-2003-7+-020-02openssh Source: CCN Type: NetBSD Security Advisory 2003-012Out of bounds memset(0) in sshd Source: CCN Type: slackware-security Mailing List, Wed Sep 17 01:25:22 PDT 2003OpenSSH updated again (SSA:2003-260-01) Source: MANDRAKE Type: UNKNOWNMDKSA-2003:090 Source: CCN Type: OpenPKG-SA-2003.040OpenSSH Source: CCN Type: OpenSSH Web siteOpenSSH Source: CCN Type: OpenSSH Security Advisory: buffer.advbuffer.adv Source: CONFIRM Type: UNKNOWNhttp://www.openssh.com/txt/buffer.adv Source: REDHAT Type: UNKNOWNRHSA-2003:280 Source: CCN Type: BID-8628OpenSSH Buffer Mismanagement Vulnerabilities Source: CCN Type: slackware-security Mailing List, Tue, 16 Sep 2003 12:39:36 -0700 (PDT)OpenSSH Security Advisory (SSA:2003-259-01) Source: CCN Type: Trustix Secure Linux Security Advisory #2003-0033openssh Source: CCN Type: TLSA-2003-51Buffer management errors Source: CCN Type: Internet Security Systems Security Advisory, September 16, 2003OpenSSH Memory Corruption Vulnerability Source: XF Type: UNKNOWNopenssh-packet-bo(13191) Source: XF Type: UNKNOWNopenssh-packet-bo(13191) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:2719 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:447 Source: SUSE Type: SUSE-SA:2003:038openssh: potential remote privilege escalation Source: SUSE Type: SUSE-SA:2003:039openssh (second release): potential remote privilege escalation Vulnerable Configuration: Configuration 1 :cpe:/a:openbsd:openssh:*:*:*:*:*:*:*:* (Version <= 3.7)Configuration CCN 1 :cpe:/a:openbsd:openssh:2.1.1:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.5.2:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.5:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.5.1:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.9:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.0:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.2.2:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.4p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.4:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.0p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.0.1:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.0.2:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.1p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.1:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.2:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.3p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.3:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.5:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.5p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.6:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:3.6.1:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.2:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.3:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.9p2:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.9p1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:2.9.9:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:1.2.2:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:1.2.3:-:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:1.2.27:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:1.2.1:*:*:*:*:*:*:* OR cpe:/a:openbsd:openssh:1.2:*:*:*:*:*:*:* AND cpe:/o:sgi:irix:6.0.1:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.1:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.2:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.3:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.4:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.0:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.1:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.2:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.3:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.4:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.7:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.5:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.6:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.8:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.9:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.10:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.11:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:* OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:engardelinux:secure_professional:-:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.15:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.16:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.6:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:1.2:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.19:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.20:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:1.3:*:*:*:*:*:*:* OR cpe:/o:cisco:catos:*:*:*:*:*:*:*:* OR cpe:/o:cisco:ciscoworks_1105_hosting_solution_engine:*:*:*:*:*:*:*:* OR cpe:/o:cisco:ciscoworks_1105_wireless_lan_solution_engine:*:*:*:*:*:*:*:* OR cpe:/o:cisco:sn_5428_storage_router:2.5.1-k9:*:*:*:*:*:*:* OR cpe:/o:cisco:sn_5428_storage_router:3.2.1-k9:*:*:*:*:*:*:* OR cpe:/o:cisco:sn_5428_storage_router:3.2.2-k9:*:*:*:*:*:*:* OR cpe:/o:cisco:sn_5428_storage_router:3.3.1-k9:*:*:*:*:*:*:* OR cpe:/o:cisco:sn_5428_storage_router:3.3.2-k9:*:*:*:*:*:*:* OR cpe:/o:cisco:sn_5428_storage_router:2-3.3.1-k9:*:*:*:*:*:*:* OR cpe:/o:cisco:sn_5428_storage_router:2-3.3.2-k9:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.21:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.21m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.21f:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.10f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.10m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.11f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.11m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.12f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.12m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.13f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.13m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.14f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.14m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.15f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.15m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.16f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.16m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.17:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.17f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.17m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.18:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.18f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.18m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.19f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.19m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.20f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.20m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.2f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.2m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.3f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.3m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.4f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.4m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.5f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.5m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.6f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.6m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.7f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.7m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.8f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.8m:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.9f:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.9m:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
openbsd openssh *
openbsd openssh 2.1.1
openbsd openssh 2.5.2
openbsd openssh 2.5
openbsd openssh 2.5.1
openbsd openssh 2.9
openbsd openssh 3.0
openbsd openssh 3.2.2
openbsd openssh 3.2.2p1
openbsd openssh 3.4p1
openbsd openssh 3.4
openbsd openssh 3.6.1p2
openbsd openssh 2.9.9p2
openbsd openssh 3.0p1
openbsd openssh 3.0.1p1
openbsd openssh 3.0.1
openbsd openssh 3.0.2p1
openbsd openssh 3.0.2
openbsd openssh 3.1p1
openbsd openssh 3.1
openbsd openssh 3.2
openbsd openssh 3.2.3p1
openbsd openssh 3.3p1
openbsd openssh 3.3
openbsd openssh 3.5
openbsd openssh 3.5p1
openbsd openssh 3.6
openbsd openssh 3.6.1p1
openbsd openssh 3.6.1
openbsd openssh 2.1
openbsd openssh 2.2
openbsd openssh 2.3
openbsd openssh 2.9p2
openbsd openssh 2.9p1
openbsd openssh 2.9.9
openbsd openssh 1.2.2
openbsd openssh 1.2.3
openbsd openssh 1.2.27
openbsd openssh 1.2.1
openbsd openssh 1.2
sgi irix 6.0.1
sgi irix 6.1
sgi irix 6.2
sgi irix 6.3
sgi irix 6.4
sgi irix 6.5
hp hp-ux 11.00
sgi irix 6.0
sgi irix 6.5.1
sgi irix 6.5.2
sgi irix 6.5.3
sgi irix 6.5.4
freebsd freebsd 4.0
hp hp-ux 11.04
redhat linux 7
hp hp-ux 11.11
netbsd netbsd 1.5
sgi irix 6.5.7
redhat linux 7.1
trustix secure linux 1.2
sgi irix 6.5.5
sgi irix 6.5.6
sgi irix 6.5.8
turbolinux turbolinux server 6.5
suse suse linux 7.2
conectiva linux 7.0
trustix secure linux 1.5
netbsd netbsd 1.5.1
redhat linux 7.2
suse suse linux 7.3
sgi irix 6.5.9
sgi irix 6.5.10
sgi irix 6.5.11
netbsd netbsd 1.5.2
engardelinux secure linux -
suse suse linux firewall *
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
sgi irix 6.5.12
sgi irix 6.5.13
sgi irix 6.5.14
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0
redhat linux 7.3
sun solaris 9
debian debian linux 3.0
slackware slackware linux 8.1
engardelinux secure professional -
openpkg openpkg current
gentoo linux *
sgi irix 6.5.15
sgi irix 6.5.16
suse suse linux office server *
netbsd netbsd 1.5.3
netbsd netbsd 1.6
redhat linux 8.0
hp hp-ux 11.22
mandrakesoft mandrake linux 9.0
suse suse email server 3.1
suse suse linux 8.1
suse linux enterprise server 8
mandrakesoft mandrake multi network firewall 8.2
netbsd netbsd current
slackware slackware linux current
turbolinux turbolinux server 6.1
openpkg openpkg 1.2
turbolinux turbolinux workstation 6.0
mandrakesoft mandrake linux corporate server 2.1
mandrakesoft mandrake linux 9.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat linux 9.0
slackware slackware linux 9.0
suse suse linux 8.2
redhat enterprise linux 2.1
conectiva linux 9.0
sgi irix 6.5.19
trustix secure linux 2.0
sgi irix 6.5.20
netbsd netbsd 1.6.1
openpkg openpkg 1.3
cisco catos *
cisco ciscoworks 1105 hosting solution engine *
cisco ciscoworks 1105 wireless lan solution engine *
cisco sn 5428 storage router 2.5.1-k9
cisco sn 5428 storage router 3.2.1-k9
cisco sn 5428 storage router 3.2.2-k9
cisco sn 5428 storage router 3.3.1-k9
cisco sn 5428 storage router 3.3.2-k9
cisco sn 5428 storage router 2-3.3.1-k9
cisco sn 5428 storage router 2-3.3.2-k9
sgi irix 6.5.21
sgi irix 6.5.21m
sgi irix 6.5.21f
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 8.2
mandrakesoft mandrake linux 9.1
mandrakesoft mandrake linux corporate server 2.1
sgi irix 6.5.10f
sgi irix 6.5.10m
sgi irix 6.5.11f
sgi irix 6.5.11m
sgi irix 6.5.12f
sgi irix 6.5.12m
sgi irix 6.5.13f
sgi irix 6.5.13m
sgi irix 6.5.14f
sgi irix 6.5.14m
sgi irix 6.5.15f
sgi irix 6.5.15m
sgi irix 6.5.16f
sgi irix 6.5.16m
sgi irix 6.5.17
sgi irix 6.5.17f
sgi irix 6.5.17m
sgi irix 6.5.18
sgi irix 6.5.18f
sgi irix 6.5.18m
sgi irix 6.5.19f
sgi irix 6.5.19m
sgi irix 6.5.20f
sgi irix 6.5.20m
sgi irix 6.5.2f
sgi irix 6.5.2m
sgi irix 6.5.3f
sgi irix 6.5.3m
sgi irix 6.5.4f
sgi irix 6.5.4m
sgi irix 6.5.5f
sgi irix 6.5.5m
sgi irix 6.5.6f
sgi irix 6.5.6m
sgi irix 6.5.7f
sgi irix 6.5.7m
sgi irix 6.5.8f
sgi irix 6.5.8m
sgi irix 6.5.9f
sgi irix 6.5.9m