Vulnerability Name:

CVE-2004-1019 (CCN-18514)

Assigned:2004-12-15
Published:2004-12-15
Updated:2018-10-30
Summary:The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Wed Dec 15 2004 - 12:46:20 CST
Advisory 01/2004: Multiple vulnerabilities in PHP 4/5

Source: CCN
Type: BugTraq Mailing List, Fri Dec 17 2004 - 11:20:23 CST
phphpbb2 + php version < 4.3.10 unserialize() memory dump sql password from config.php exploit

Source: MITRE
Type: CNA
CVE-2004-1019

Source: SUSE
Type: UNKNOWN
SUSE-SU-2015:0365

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2015:0325

Source: BUGTRAQ
Type: UNKNOWN
20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5

Source: OPENPKG
Type: UNKNOWN
OpenPKG-SA-2004.053

Source: CCN
Type: RHSA-2004-687
php security update

Source: CCN
Type: RHSA-2005-031
php security update

Source: CCN
Type: RHSA-2005-032
php security update

Source: CCN
Type: RHSA-2005-816
apache

Source: CCN
Type: CIAC Information Bulletin P-067
PHP Multiple Vulnerabilities

Source: CCN
Type: CIAC Information Bulletin P-116
Apple Security Update 2005-001 for Mac OS X

Source: CCN
Type: GLSA-200412-14
PHP: Multiple vulnerabilities

Source: MISC
Type: UNKNOWN
http://www.hardened-php.net/advisories/012004.txt

Source: CCN
Type: Fedora Update Notification FEDORA-2004-567
Fedora: php-4.3.10-2.4 update

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2004:151

Source: SUSE
Type: UNKNOWN
SUSE-SA:2005:002

Source: CCN
Type: OpenPKG-SA-2004.053
PHP

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html

Source: CCN
Type: PHP Web site
PHP 4.3.10 Release Announcement

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/release_4_3_10.php

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2004:687

Source: REDHAT
Type: UNKNOWN
RHSA-2005:032

Source: REDHAT
Type: UNKNOWN
RHSA-2005:816

Source: HP
Type: UNKNOWN
HPSBMA01212

Source: CCN
Type: BID-11964
PHP Multiple Local And Remote Vulnerabilities

Source: CCN
Type: TLSA-2005-1
Multiple vulnerabilities in php

Source: CCN
Type: USN-40-1
PHP vulnerabilities

Source: FEDORA
Type: UNKNOWN
FLSA:2344

Source: XF
Type: UNKNOWN
php-unserialize-code-execution(18514)

Source: XF
Type: UNKNOWN
php-unserialize-code-execution(18514)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10511

Source: SUSE
Type: SUSE-SA:2005:002
php4/mod_php4: remote code execution

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.1:patch1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.1:patch2:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.3:patch1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2:*:dev:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0:rc2:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:stronghold:-:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora_core:2:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20041019
    V
    CVE-2004-1019
    2022-05-20
    oval:org.opensuse.security:def:33758
    P
    Security update for xorg-x11-server (Important)
    2021-12-20
    oval:org.opensuse.security:def:34609
    P
    Security update for mozilla-nss (Important)
    2021-12-06
    oval:org.opensuse.security:def:29423
    P
    Security update for openssl (Low)
    2021-09-20
    oval:org.opensuse.security:def:33971
    P
    Security update for openssl-1_0_0 (Low)
    2021-09-09
    oval:org.opensuse.security:def:33927
    P
    Security update for caribou (Important)
    2021-06-10
    oval:org.opensuse.security:def:33903
    P
    Security update for samba (Important)
    2021-05-04
    oval:org.opensuse.security:def:34649
    P
    Security update for the Linux Kernel (Important)
    2021-03-09
    oval:org.opensuse.security:def:29480
    P
    Security update for openldap2 (Important)
    2021-03-03
    oval:org.opensuse.security:def:33136
    P
    libQtWebKit4-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:30560
    P
    Security update for OpenSSL
    2020-12-01
    oval:org.opensuse.security:def:33864
    P
    Security update for jasper
    2020-12-01
    oval:org.opensuse.security:def:29565
    P
    Security update for OpenEXR (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33226
    P
    pcsc-ccid on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29125
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:29772
    P
    Security update for glibc (Important)
    2020-12-01
    oval:org.opensuse.security:def:33456
    P
    Security update for icu
    2020-12-01
    oval:org.opensuse.security:def:29137
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:29860
    P
    Security update for the Linux Kernel
    2020-12-01
    oval:org.opensuse.security:def:33601
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:29337
    P
    Security update for spacewalk
    2020-12-01
    oval:org.opensuse.security:def:33135
    P
    libMagickCore1-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29922
    P
    Security update for libexif (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33815
    P
    Security update for glib2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33147
    P
    libexif on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:30597
    P
    Security update for php53 (Important)
    2020-12-01
    oval:org.opensuse.security:def:29718
    P
    Security update for MozillaFirefox
    2020-12-01
    oval:org.opensuse.security:def:33361
    P
    Security update for openssl1 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29126
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:29821
    P
    Security update for java-1_6_0-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:33513
    P
    Security update for perl-HTML-Parser
    2020-12-01
    oval:org.opensuse.security:def:29206
    P
    Security update for openssl (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29878
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.mitre.oval:def:10511
    V
    The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
    2013-04-29
    oval:com.redhat.rhsa:def:20050032
    P
    RHSA-2005:032: php security update (Important)
    2005-02-15
    oval:com.redhat.rhsa:def:20040687
    P
    RHSA-2004:687: php security update (Important)
    2004-12-21
    BACK
    openpkg openpkg 2.1
    openpkg openpkg 2.2
    openpkg openpkg current
    php php 3.0
    php php 3.0.1
    php php 3.0.2
    php php 3.0.3
    php php 3.0.4
    php php 3.0.5
    php php 3.0.6
    php php 3.0.7
    php php 3.0.8
    php php 3.0.9
    php php 3.0.10
    php php 3.0.11
    php php 3.0.12
    php php 3.0.13
    php php 3.0.14
    php php 3.0.15
    php php 3.0.16
    php php 3.0.17
    php php 3.0.18
    php php 4.0
    php php 4.0.1
    php php 4.0.1 patch1
    php php 4.0.1 patch2
    php php 4.0.2
    php php 4.0.3
    php php 4.0.3 patch1
    php php 4.0.4
    php php 4.0.5
    php php 4.0.6
    php php 4.0.7
    php php 4.0.7 rc1
    php php 4.0.7 rc2
    php php 4.0.7 rc3
    php php 4.1.0
    php php 4.1.1
    php php 4.1.2
    php php 4.2
    php php 4.2.0
    php php 4.2.1
    php php 4.2.2
    php php 4.2.3
    php php 4.3.0
    php php 4.3.1
    php php 4.3.2
    php php 4.3.3
    php php 4.3.4
    php php 4.3.5
    php php 4.3.6
    php php 4.3.7
    php php 4.3.8
    php php 4.3.9
    php php 5.0 rc1
    php php 5.0 rc2
    php php 5.0 rc3
    php php 5.0.0
    php php 5.0.1
    php php 5.0.2
    trustix secure linux 2.0
    trustix secure linux 2.1
    trustix secure linux 2.2
    ubuntu ubuntu linux 4.1
    ubuntu ubuntu linux 4.1
    php php 4.0.5
    php php 4.1.1
    php php 4.2.0
    php php 4.2.1
    php php 4.2.3
    php php 4.2.2
    php php 4.3.0
    php php 4.3.4
    php php 4.3.9
    php php 5.0.0
    php php 4.3.3
    php php 5.0.2
    php php 4.0.0
    php php 4.0.1
    php php 4.0.2
    php php 4.0.3
    php php 4.0.4
    php php 4.0.6
    php php 4.0.7
    php php 4.0 beta_4_patch1
    php php 4.0 beta1
    php php 4.0 beta2
    php php 4.0 beta3
    php php 4.0 beta4
    php php 4.1.0
    php php 4.1.2
    php php 4.3.1
    php php 4.3.2
    php php 4.3.5
    php php 4.3.6
    php php 4.3.7
    php php 4.3.8
    php php 5.0.0 beta1
    php php 5.0.0 beta2
    php php 5.0.0 beta3
    php php 5.0.0 beta4
    php php 5.0.0 rc1
    php php 5.0.0 rc2
    php php 5.0.0 rc3
    php php 5.0.1
    php php 4.0 rc1
    php php 4.0 rc2
    redhat stronghold -
    openpkg openpkg current
    gentoo linux *
    suse suse linux 8.1
    suse linux enterprise server 8
    mandrakesoft mandrake linux corporate server 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    suse suse linux 8.2
    suse suse linux 9.0
    mandrakesoft mandrake linux 9.2
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux 10.0
    suse suse linux 9.1
    redhat enterprise linux 3
    fedoraproject fedora core 2
    openpkg openpkg 2.1
    suse suse linux 9.2
    openpkg openpkg 2.2
    mandrakesoft mandrake linux 10.1
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 10.1
    turbolinux turbolinux home *
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux corporate server 2.1