Vulnerability Name:

CVE-2005-0988 (CCN-28192)

Assigned:2005-04-04
Published:2005-04-04
Updated:2017-10-11
Summary:Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-05:11.gzip
gzip directory traversal and permission race vulnerabilities

Source: SCO
Type: UNKNOWN
SCOSA-2005.58

Source: CCN
Type: BugTraq Mailing List, Mon Apr 04 2005 - 14:57:24 CDT
gzip TOCTOU file-permissions vulnerability

Source: MITRE
Type: CNA
CVE-2005-0988

Source: CCN
Type: Apple Security Update 2006-004
About Security Update 2006-004

Source: APPLE
Type: UNKNOWN
APPLE-SA-2006-08-01

Source: CCN
Type: RHSA-2005-357
gzip security update

Source: REDHAT
Type: UNKNOWN
RHSA-2005:357

Source: SECUNIA
Type: UNKNOWN
18100

Source: CCN
Type: SA21253
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
21253

Source: SECUNIA
Type: UNKNOWN
22033

Source: SLACKWARE
Type: UNKNOWN
SSA:2006-262

Source: CCN
Type: Sun Alert ID: 101816
Security Vulnerabilities in the gzip(1) Command

Source: SUNALERT
Type: UNKNOWN
101816

Source: DEBIAN
Type: UNKNOWN
DSA-752

Source: DEBIAN
Type: DSA-752
gzip -- several vulnerabilities

Source: CCN
Type: GLSA-200505-05
gzip: Multiple vulnerabilities

Source: CCN
Type: gzip Home page
The gzip home page

Source: OSVDB
Type: UNKNOWN
15487

Source: CCN
Type: OSVDB ID: 15487
gzip Race Condition Arbitrary File Permission Modification

Source: BUGTRAQ
Type: Vendor Advisory
20050404 gzip TOCTOU file-permissions vulnerability

Source: BID
Type: Patch
12996

Source: CCN
Type: BID-12996
GNU GZip CHMod File Permission Modification Race Condition Weakness

Source: BID
Type: UNKNOWN
19289

Source: CCN
Type: BID-19289
Apple Mac OS X Multiple Security Vulnerabilities

Source: CCN
Type: TLSA-2005-59
Multiple vulnerabilities exist in gzip

Source: CCN
Type: USN-116-1
gzip vulnerabilities

Source: CERT
Type: US Government Resource
TA06-214A

Source: VUPEN
Type: UNKNOWN
ADV-2006-3101

Source: XF
Type: UNKNOWN
gzip-race-condition(28192)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10242

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1169

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:765

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnu:gzip:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gzip:1.3.3:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.9:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.10:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.10:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:*
  • OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:workgroup:*:server:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:10.0:*:*:*:desktop:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:7.0:*:*:*:server:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:8.0:*:*:*:server:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:10.0:*:*:*:server:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:7.0:*:*:*:workstation:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:8.0:*:*:*:workstation:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:gzip:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gzip:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:gzip:1.3.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8::x86:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::x86:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::x86:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10242
    V
    Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
    2013-04-29
    oval:org.mitre.oval:def:765
    V
    GNU GZip CHMod File Permission Modification Race ConditionWeakness
    2009-08-03
    oval:org.mitre.oval:def:1169
    V
    gzip Hard Link Attack
    2005-08-18
    oval:org.debian:def:752
    V
    several vulnerabilities
    2005-07-11
    oval:com.redhat.rhsa:def:20050357
    P
    RHSA-2005:357: gzip security update (Low)
    2005-06-13
    BACK
    gnu gzip 1.2.4
    gnu gzip 1.2.4a
    gnu gzip 1.3.3
    freebsd freebsd 4.0
    freebsd freebsd 4.0 alpha
    freebsd freebsd 4.0 releng
    freebsd freebsd 4.1
    freebsd freebsd 4.1.1
    freebsd freebsd 4.1.1 release
    freebsd freebsd 4.1.1 stable
    freebsd freebsd 4.2
    freebsd freebsd 4.2 stable
    freebsd freebsd 4.3
    freebsd freebsd 4.3 release
    freebsd freebsd 4.3 release_p38
    freebsd freebsd 4.3 releng
    freebsd freebsd 4.3 stable
    freebsd freebsd 4.4
    freebsd freebsd 4.4 release_p42
    freebsd freebsd 4.4 releng
    freebsd freebsd 4.4 stable
    freebsd freebsd 4.5
    freebsd freebsd 4.5 release
    freebsd freebsd 4.5 release_p32
    freebsd freebsd 4.5 releng
    freebsd freebsd 4.5 stable
    freebsd freebsd 4.6
    freebsd freebsd 4.6 release
    freebsd freebsd 4.6 release_p20
    freebsd freebsd 4.6 releng
    freebsd freebsd 4.6 stable
    freebsd freebsd 4.6.2
    freebsd freebsd 4.7
    freebsd freebsd 4.7 release
    freebsd freebsd 4.7 release_p17
    freebsd freebsd 4.7 releng
    freebsd freebsd 4.7 stable
    freebsd freebsd 4.8
    freebsd freebsd 4.8 pre-release
    freebsd freebsd 4.8 release_p6
    freebsd freebsd 4.8 releng
    freebsd freebsd 4.9
    freebsd freebsd 4.9 pre-release
    freebsd freebsd 4.9 releng
    freebsd freebsd 4.10
    freebsd freebsd 4.10 release
    freebsd freebsd 4.10 release_p8
    freebsd freebsd 4.10 releng
    freebsd freebsd 4.11 release_p3
    freebsd freebsd 4.11 releng
    freebsd freebsd 4.11 stable
    freebsd freebsd 5.0
    freebsd freebsd 5.0 alpha
    freebsd freebsd 5.0 release_p14
    freebsd freebsd 5.0 releng
    freebsd freebsd 5.1
    freebsd freebsd 5.1 alpha
    freebsd freebsd 5.1 release
    freebsd freebsd 5.1 release_p5
    freebsd freebsd 5.1 releng
    freebsd freebsd 5.2
    freebsd freebsd 5.2.1 release
    freebsd freebsd 5.2.1 releng
    freebsd freebsd 5.3
    freebsd freebsd 5.3 release
    freebsd freebsd 5.3 releng
    freebsd freebsd 5.3 stable
    freebsd freebsd 5.4 pre-release
    freebsd freebsd 5.4 release
    freebsd freebsd 5.4 releng
    gentoo linux *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux 4.0
    redhat enterprise linux 4.0
    redhat enterprise linux 4.0
    redhat enterprise linux desktop 3.0
    redhat enterprise linux desktop 4.0
    redhat linux advanced workstation 2.1
    redhat linux advanced workstation 2.1
    trustix secure linux 2.0
    trustix secure linux 2.1
    trustix secure linux 2.2
    turbolinux turbolinux appliance server 1.0_hosting
    turbolinux turbolinux appliance server 1.0_workgroup
    turbolinux turbolinux desktop 10.0
    turbolinux turbolinux home *
    turbolinux turbolinux server 7.0
    turbolinux turbolinux server 8.0
    turbolinux turbolinux server 10.0
    turbolinux turbolinux workstation 7.0
    turbolinux turbolinux workstation 8.0
    ubuntu ubuntu linux 4.1
    ubuntu ubuntu linux 4.1
    ubuntu ubuntu linux 5.04
    ubuntu ubuntu linux 5.04
    ubuntu ubuntu linux 5.04
    gnu gzip 1.3
    gnu gzip 1.2.4a
    gnu gzip 1.2.4
    gnu gzip 1.3.3
    freebsd freebsd *
    sun solaris 8
    debian debian linux 3.0
    gentoo linux *
    mandrakesoft mandrake linux corporate server 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    sun solaris 8
    sun solaris 9
    mandrakesoft mandrake linux 10.0
    redhat enterprise linux 3
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    sun solaris 10
    sun solaris 10
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux home *
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux corporate server 2.1
    sun solaris 9