Vulnerability Name: | CVE-2005-4268 (CCN-23855) |
Assigned: | 2005-11-07 |
Published: | 2005-11-07 |
Updated: | 2018-10-03 |
Summary: | Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P) 2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Authentication (Au): | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Athentication (Au):
| Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
Vulnerability Type: | CWE-119
|
Vulnerability Consequences: | Gain Access |
References: | Source: FREEBSD Type: UNKNOWN FreeBSD-SA-06:03
Source: MITRE Type: CNA CVE-2005-4268
Source: MITRE Type: CNA CVE-2010-0624
Source: MITRE Type: CNA CVE-2010-1168
Source: MITRE Type: CNA CVE-2010-1321
Source: MITRE Type: CNA CVE-2010-1447
Source: MITRE Type: CNA CVE-2010-2063
Source: MANDRIVA Type: UNKNOWN MDKSA-2005:237
Source: SUSE Type: UNKNOWN SUSE-SR:2006:010
Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console
Source: CCN Type: RHSA-2007-0245 Low: cpio security and bug fix update
Source: CCN Type: RHSA-2010-0141 Moderate: tar security update
Source: CCN Type: RHSA-2010-0142 Moderate: tar security update
Source: CCN Type: RHSA-2010-0143 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0144 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0145 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0423 Important: krb5 security update
Source: CCN Type: RHSA-2010-0457 Moderate: perl security update
Source: CCN Type: RHSA-2010-0458 Moderate: perl security update
Source: CCN Type: RHSA-2010-0488 Critical: samba and samba3x security update
Source: CCN Type: RHSA-2010-0770 Critical: java-1.6.0-sun security update
Source: CCN Type: RHSA-2010-0807 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0873 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0935 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2010-0987 Critical: java-1.6.0-ibm security and bug fix update
Source: CCN Type: RHSA-2011-0152 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2011-0880 Low: Red Hat Network Satellite server IBM Java Runtime security update
Source: CCN Type: SA18251 Cpio Large File Size Handling Denial of Service Vulnerability
Source: SECUNIA Type: UNKNOWN 18251
Source: SECUNIA Type: UNKNOWN 18278
Source: SECUNIA Type: UNKNOWN 18280
Source: SECUNIA Type: UNKNOWN 18395
Source: SECUNIA Type: UNKNOWN 20117
Source: SECUNIA Type: UNKNOWN 25098
Source: SECUNIA Type: UNKNOWN 25161
Source: CCN Type: SA38869 GNU Cpio "rmt" Buffer Overflow Vulnerability
Source: CCN Type: SA39762 Kerberos GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA39845 PostgreSQL Two Vulnerabilities
Source: CCN Type: SA40145 Samba SMB1 Packet Chaining Memory Corruption Vulnerability
Source: CCN Type: SA41196 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA41262 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA42280 VMware ESX / ESXi Server Update for Multiple Packages
Source: CCN Type: SA42402 Oracle Solaris Perl Safe Module Security Bypass
Source: CCN Type: SA42974 Oracle JRockit Multiple Vulnerabilities
Source: CCN Type: SA43335 Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA47305 F5 Enterprise Manager Multiple Vulnerabilities
Source: CCN Type: SECTRACK ID: 1023988 PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges
Source: CCN Type: SECTRACK ID: 1024062 Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed
Source: CCN Type: SECTRACK ID: 1024107 Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code
Source: CCN Type: ASA-2007-251 cpio security and bug fix update (RHSA-2007-0245)
Source: CCN Type: F5 Networks Web site Release Note: Enterprise Manager version 2.3.0
Source: DEBIAN Type: DSA-2052 krb5 -- null pointer dereference
Source: DEBIAN Type: DSA-2061 samba -- memory corruption
Source: DEBIAN Type: DSA-2267 perl -- restriction bypass
Source: CCN Type: GNU Project Web site Cpio
Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011 Oracle Critical Patch Update Advisory - July 2011
Source: OSVDB Type: UNKNOWN 22194
Source: CCN Type: OSVDB ID: 22194 cpio on 64-bit Large File Size Handling Overflow
Source: CCN Type: OSVDB ID: 62950 GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow
Source: CCN Type: OSVDB ID: 64744 MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS
Source: CCN Type: OSVDB ID: 64756 PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)
Source: CCN Type: OSVDB ID: 65518 Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption
Source: REDHAT Type: UNKNOWN RHSA-2007:0245
Source: REDHAT Type: UNKNOWN RHSA-2010:0145
Source: BID Type: UNKNOWN 16057
Source: CCN Type: BID-16057 CPIO File Size Stack Buffer Overflow Vulnerability
Source: CCN Type: BID-40235 MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability
Source: CCN Type: BID-40305 Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities
Source: CCN Type: BID-40884 Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability
Source: CCN Type: USN-234-1 cpio vulnerability
Source: CCN Type: Red Hat Bugzilla Bug 172669 CVE-2005-4268 cpio large filesize buffer overflow
Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669
Source: XF Type: UNKNOWN cpio-file-size-bo(23855)
Source: XF Type: UNKNOWN cpio-file-size-bo(23855)
Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-1338
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10450
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:6860
Source: UBUNTU Type: UNKNOWN USN-234-1
Source: SUSE Type: SUSE-SA:2010:025 Samba security update
Source: SUSE Type: SUSE-SA:2011:006 IBM Java 6 security update
Source: SUSE Type: SUSE-SA:2011:014 IBM Java security update
Source: SUSE Type: SUSE-SR:2006:010 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:011 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:013 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:015 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:016 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:019 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2011:008 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration 1: cpe:/a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
Denotes that component is vulnerable |
Vulnerability Name: | CVE-2005-4268 (CCN-56803) |
Assigned: | 2005-11-07 |
Published: | 2005-11-07 |
Updated: | 2010-03-09 |
Summary: | Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P) 2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Authentication (Au): | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Athentication (Au):
| Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2005-4268
Source: MITRE Type: CNA CVE-2010-0624
Source: MITRE Type: CNA CVE-2010-1168
Source: MITRE Type: CNA CVE-2010-1321
Source: MITRE Type: CNA CVE-2010-1447
Source: MITRE Type: CNA CVE-2010-2063
Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console
Source: CCN Type: RHSA-2007-0245 Low: cpio security and bug fix update
Source: CCN Type: RHSA-2010-0141 Moderate: tar security update
Source: CCN Type: RHSA-2010-0142 Moderate: tar security update
Source: CCN Type: RHSA-2010-0143 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0144 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0145 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0423 Important: krb5 security update
Source: CCN Type: RHSA-2010-0457 Moderate: perl security update
Source: CCN Type: RHSA-2010-0458 Moderate: perl security update
Source: CCN Type: RHSA-2010-0488 Critical: samba and samba3x security update
Source: CCN Type: RHSA-2010-0770 Critical: java-1.6.0-sun security update
Source: CCN Type: RHSA-2010-0807 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0873 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0935 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2010-0987 Critical: java-1.6.0-ibm security and bug fix update
Source: CCN Type: RHSA-2011-0152 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2011-0880 Low: Red Hat Network Satellite server IBM Java Runtime security update
Source: CCN Type: SA18251 Cpio Large File Size Handling Denial of Service Vulnerability
Source: CCN Type: SA38836 GNU Tar "rmt" Buffer Overflow Vulnerability
Source: CCN Type: SA38869 GNU Cpio "rmt" Buffer Overflow Vulnerability
Source: CCN Type: SA39762 Kerberos GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA39845 PostgreSQL Two Vulnerabilities
Source: CCN Type: SA40145 Samba SMB1 Packet Chaining Memory Corruption Vulnerability
Source: CCN Type: SA40511 Sun Solaris GNU Tar and GNU Cpio Buffer Overflow Vulnerability
Source: CCN Type: SA41196 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA41262 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA42280 VMware ESX / ESXi Server Update for Multiple Packages
Source: CCN Type: SA42402 Oracle Solaris Perl Safe Module Security Bypass
Source: CCN Type: SA42974 Oracle JRockit Multiple Vulnerabilities
Source: CCN Type: SA43335 Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA47305 F5 Enterprise Manager Multiple Vulnerabilities
Source: CCN Type: SECTRACK ID: 1023988 PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges
Source: CCN Type: SECTRACK ID: 1024062 Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed
Source: CCN Type: SECTRACK ID: 1024107 Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code
Source: CCN Type: F5 Networks Web site Release Note: Enterprise Manager version 2.3.0
Source: DEBIAN Type: DSA-2052 krb5 -- null pointer dereference
Source: DEBIAN Type: DSA-2061 samba -- memory corruption
Source: DEBIAN Type: DSA-2267 perl -- restriction bypass
Source: CCN Type: GNU cpio Web page Introduction to Cpio
Source: CCN Type: GNU tar Web site Tar - GNU Project - Free Software Foundation (FSF)
Source: CCN Type: IBM Security Bulletin T1025085 (Flex System Manager Node) IBM Flex System Manager (FSM) is affected by tar vulnerabilities (CVE-2010-0624 CVE-2016-6321)
Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011 Oracle Critical Patch Update Advisory - July 2011
Source: CCN Type: OSVDB ID: 22194 cpio on 64-bit Large File Size Handling Overflow
Source: CCN Type: OSVDB ID: 62950 GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow
Source: CCN Type: OSVDB ID: 64744 MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS
Source: CCN Type: OSVDB ID: 64756 PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)
Source: CCN Type: OSVDB ID: 65518 Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption
Source: CCN Type: BID-16057 CPIO File Size Stack Buffer Overflow Vulnerability
Source: CCN Type: BID-38628 GNU Tar and GNU Cpio Remote Buffer Overflow Vulnerability
Source: CCN Type: BID-40235 MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability
Source: CCN Type: BID-40305 Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities
Source: CCN Type: BID-40884 Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability
Source: XF Type: UNKNOWN tar-cpio-rmtread-bo(56803)
Source: SUSE Type: SUSE-SA:2010:025 Samba security update
Source: SUSE Type: SUSE-SA:2011:006 IBM Java 6 security update
Source: SUSE Type: SUSE-SA:2011:014 IBM Java security update
Source: SUSE Type: SUSE-SR:2010:011 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:013 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:015 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:016 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:019 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2011:008 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:gnu:tar:1.22:*:*:*:*:*:*:*OR cpe:/a:gnu:cpio:2.10:*:*:*:*:*:*:*AND cpe:/o:sun:solaris:9.0:*:*:*:*:sparc:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/a:quest:intrust_knowledge_pack_for_sun_solaris:10.2.5.1024:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/h:ibm:flex_system_manager_node:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Vulnerability Name: | CVE-2005-4268 (CCN-58737) |
Assigned: | 2005-11-07 |
Published: | 2005-11-07 |
Updated: | 2010-05-17 |
Summary: | Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits. |
CVSS v3 Severity: | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P) 2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Authentication (Au): | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P) 4.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Athentication (Au):
| Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2005-4268
Source: MITRE Type: CNA CVE-2010-0624
Source: MITRE Type: CNA CVE-2010-1168
Source: MITRE Type: CNA CVE-2010-1321
Source: MITRE Type: CNA CVE-2010-1447
Source: MITRE Type: CNA CVE-2010-2063
Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console
Source: CCN Type: oss-security Mailing List, 20 May 18:26 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request
Source: CCN Type: RHSA-2007-0245 Low: cpio security and bug fix update
Source: CCN Type: RHSA-2010-0141 Moderate: tar security update
Source: CCN Type: RHSA-2010-0142 Moderate: tar security update
Source: CCN Type: RHSA-2010-0143 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0144 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0145 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0423 Important: krb5 security update
Source: CCN Type: RHSA-2010-0457 Moderate: perl security update
Source: CCN Type: RHSA-2010-0458 Moderate: perl security update
Source: CCN Type: RHSA-2010-0488 Critical: samba and samba3x security update
Source: CCN Type: RHSA-2010-0770 Critical: java-1.6.0-sun security update
Source: CCN Type: RHSA-2010-0807 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0873 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0935 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2010-0987 Critical: java-1.6.0-ibm security and bug fix update
Source: CCN Type: RHSA-2011-0152 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2011-0880 Low: Red Hat Network Satellite server IBM Java Runtime security update
Source: CCN Type: SA18251 Cpio Large File Size Handling Denial of Service Vulnerability
Source: CCN Type: SA38869 GNU Cpio "rmt" Buffer Overflow Vulnerability
Source: CCN Type: SA39762 Kerberos GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA39845 PostgreSQL Two Vulnerabilities
Source: CCN Type: SA40145 Samba SMB1 Packet Chaining Memory Corruption Vulnerability
Source: CCN Type: SA41196 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA41262 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA42280 VMware ESX / ESXi Server Update for Multiple Packages
Source: CCN Type: SA42402 Oracle Solaris Perl Safe Module Security Bypass
Source: CCN Type: SA42974 Oracle JRockit Multiple Vulnerabilities
Source: CCN Type: SA43309 VMware Products Oracle (Sun) JRE Multiple Vulnerabilities
Source: CCN Type: SA43335 Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA47305 F5 Enterprise Manager Multiple Vulnerabilities
Source: CCN Type: SECTRACK ID: 1023988 PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges
Source: CCN Type: SECTRACK ID: 1024062 Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed
Source: CCN Type: SECTRACK ID: 1024107 Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code
Source: CCN Type: F5 Networks Web site Release Note: Enterprise Manager version 2.3.0
Source: DEBIAN Type: DSA-2052 krb5 -- null pointer dereference
Source: DEBIAN Type: DSA-2061 samba -- memory corruption
Source: DEBIAN Type: DSA-2267 perl -- restriction bypass
Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011 Oracle Critical Patch Update Advisory - July 2011
Source: CCN Type: OSVDB ID: 22194 cpio on 64-bit Large File Size Handling Overflow
Source: CCN Type: OSVDB ID: 62950 GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow
Source: CCN Type: OSVDB ID: 64744 MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS
Source: CCN Type: OSVDB ID: 64756 PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)
Source: CCN Type: OSVDB ID: 65518 Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption
Source: CCN Type: PostgreSQL Web Site PostgreSQL Security Information
Source: CCN Type: BID-16057 CPIO File Size Stack Buffer Overflow Vulnerability
Source: CCN Type: BID-40235 MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability
Source: CCN Type: BID-40302 Perl Safe Module 'reval()' and 'rdo()' Restriction-Bypass Vulnerabilities
Source: CCN Type: BID-40305 Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities
Source: CCN Type: BID-40884 Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability
Source: CCN Type: Red Hat Bugzilla Bug 588269 CVE-2010-1447 perl: Safe restriction bypass when reference to subroutine in compartment is called from outside
Source: XF Type: UNKNOWN postgresql-plperl-code-execution(58737)
Source: SUSE Type: SUSE-SA:2010:025 Samba security update
Source: SUSE Type: SUSE-SA:2011:006 IBM Java 6 security update
Source: SUSE Type: SUSE-SA:2011:014 IBM Java security update
Source: SUSE Type: SUSE-SR:2010:011 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:013 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:015 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:016 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:019 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2011:008 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*OR cpe:/a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*OR cpe:/a:larry_wall:perl:5.9.2:*:*:*:*:*:*:*OR cpe:/a:larry_wall:perl:5.8.6:*:*:*:*:*:*:*OR cpe:/a:postgresql:postgresql:8.0:*:*:*:*:*:*:*OR cpe:/a:postgresql:postgresql:8.1:*:*:*:*:*:*:*OR cpe:/a:postgresql:postgresql:8.2:*:*:*:*:*:*:*OR cpe:/a:postgresql:postgresql:7.4:*:*:*:*:*:*:*OR cpe:/a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*OR cpe:/a:larry_wall:perl:5.8.8:*:*:*:*:*:*:*OR cpe:/a:postgresql:postgresql:8.3:*:*:*:*:*:*:*OR cpe:/a:postgresql:postgresql:8.4:*:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Vulnerability Name: | CVE-2005-4268 (CCN-58747) |
Assigned: | 2005-11-07 |
Published: | 2005-11-07 |
Updated: | 2010-05-18 |
Summary: | Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits. |
CVSS v3 Severity: | 3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P) 2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Authentication (Au): | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P) 3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Athentication (Au):
| Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2005-4268
Source: MITRE Type: CNA CVE-2010-0624
Source: MITRE Type: CNA CVE-2010-1168
Source: MITRE Type: CNA CVE-2010-1321
Source: MITRE Type: CNA CVE-2010-1447
Source: MITRE Type: CNA CVE-2010-2063
Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console
Source: CCN Type: RHSA-2007-0245 Low: cpio security and bug fix update
Source: CCN Type: RHSA-2010-0141 Moderate: tar security update
Source: CCN Type: RHSA-2010-0142 Moderate: tar security update
Source: CCN Type: RHSA-2010-0143 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0144 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0145 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0423 Important: krb5 security update
Source: CCN Type: RHSA-2010-0457 Moderate: perl security update
Source: CCN Type: RHSA-2010-0458 Moderate: perl security update
Source: CCN Type: RHSA-2010-0488 Critical: samba and samba3x security update
Source: CCN Type: RHSA-2010-0770 Critical: java-1.6.0-sun security update
Source: CCN Type: RHSA-2010-0807 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0873 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0935 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2010-0987 Critical: java-1.6.0-ibm security and bug fix update
Source: CCN Type: RHSA-2011-0152 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2011-0880 Low: Red Hat Network Satellite server IBM Java Runtime security update
Source: CCN Type: SA18251 Cpio Large File Size Handling Denial of Service Vulnerability
Source: CCN Type: SA38869 GNU Cpio "rmt" Buffer Overflow Vulnerability
Source: CCN Type: SA39762 Kerberos GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA39845 PostgreSQL Two Vulnerabilities
Source: CCN Type: SA39953 Heimdal GSS-API and kdc NULL Pointer Dereferences Denial of Service
Source: CCN Type: SA40145 Samba SMB1 Packet Chaining Memory Corruption Vulnerability
Source: CCN Type: SA40209 Avaya Products krb5 GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA41196 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA41262 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA42280 VMware ESX / ESXi Server Update for Multiple Packages
Source: CCN Type: SA42402 Oracle Solaris Perl Safe Module Security Bypass
Source: CCN Type: SA42974 Oracle JRockit Multiple Vulnerabilities
Source: CCN Type: SA43335 Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA47305 F5 Enterprise Manager Multiple Vulnerabilities
Source: CCN Type: SECTRACK ID: 1023988 PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges
Source: CCN Type: SECTRACK ID: 1024062 Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed
Source: CCN Type: SECTRACK ID: 1024107 Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code
Source: CCN Type: F5 Networks Web site Release Note: Enterprise Manager version 2.3.0
Source: CCN Type: MITKRB5-SA-2010-005 GSS-API library null pointer dereference
Source: DEBIAN Type: DSA-2052 krb5 -- null pointer dereference
Source: DEBIAN Type: DSA-2061 samba -- memory corruption
Source: DEBIAN Type: DSA-2267 perl -- restriction bypass
Source: CCN Type: Heimdal Web site 2010-05-27 - Tries to follow NULL pointers in KDC and GSS-API Kerberos acceptor (server)
Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011 Oracle Critical Patch Update Advisory - July 2011
Source: CCN Type: Oracle Critical Patch Update Advisory - October 2010 Oracle Critical Patch Update Advisory - October 2010
Source: CCN Type: Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010 Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010
Source: CCN Type: OSVDB ID: 22194 cpio on 64-bit Large File Size Handling Overflow
Source: CCN Type: OSVDB ID: 62950 GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow
Source: CCN Type: OSVDB ID: 64744 MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS
Source: CCN Type: OSVDB ID: 64756 PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)
Source: CCN Type: OSVDB ID: 65518 Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption
Source: CCN Type: BID-16057 CPIO File Size Stack Buffer Overflow Vulnerability
Source: CCN Type: BID-40235 MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability
Source: CCN Type: BID-40305 Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities
Source: CCN Type: BID-40884 Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability
Source: CCN Type: USN-940-1 Kerberos vulnerabilities
Source: XF Type: UNKNOWN kerberos-apreq-dos(58747)
Source: CCN Type: ASA-2010-160 Avaya Products krb5 GSS-API NULL Pointer Dereference Vulnerability
Source: SUSE Type: SUSE-SA:2010:025 Samba security update
Source: SUSE Type: SUSE-SA:2011:006 IBM Java 6 security update
Source: SUSE Type: SUSE-SA:2011:014 IBM Java security update
Source: SUSE Type: SUSE-SR:2010:011 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:013 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:015 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:016 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:019 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2011:008 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:oracle:database_server:*:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.5:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:-:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.4:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.6:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.0:-:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.7:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.8:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos:5-1.8:alpha:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*OR cpe:/o:canonical:ubuntu:6.06:*:lts:*:*:*:*:*OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*OR cpe:/a:avaya:communication_manager:5.0:*:*:*:*:*:*:*OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*OR cpe:/o:canonical:ubuntu:8.04:*:lts:*:*:*:*:*OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*OR cpe:/a:avaya:communication_manager:5.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Vulnerability Name: | CVE-2005-4268 (CCN-59481) |
Assigned: | 2005-11-07 |
Published: | 2005-11-07 |
Updated: | 2010-06-16 |
Summary: | Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits. |
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P) 2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Authentication (Au): | Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Access Complexity (AC): Athentication (Au):
| Impact Metrics: | Confidentiality (C): Integrity (I): Availibility (A): |
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2005-4268
Source: MITRE Type: CNA CVE-2010-0624
Source: MITRE Type: CNA CVE-2010-1168
Source: MITRE Type: CNA CVE-2010-1321
Source: MITRE Type: CNA CVE-2010-1447
Source: MITRE Type: CNA CVE-2010-2063
Source: CCN Type: VMSA-2010-0013 VMware ESX third party updates for Service Console
Source: CCN Type: RHSA-2007-0245 Low: cpio security and bug fix update
Source: CCN Type: RHSA-2010-0141 Moderate: tar security update
Source: CCN Type: RHSA-2010-0142 Moderate: tar security update
Source: CCN Type: RHSA-2010-0143 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0144 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0145 Moderate: cpio security update
Source: CCN Type: RHSA-2010-0423 Important: krb5 security update
Source: CCN Type: RHSA-2010-0457 Moderate: perl security update
Source: CCN Type: RHSA-2010-0458 Moderate: perl security update
Source: CCN Type: RHSA-2010-0488 Critical: samba and samba3x security update
Source: CCN Type: RHSA-2010-0770 Critical: java-1.6.0-sun security update
Source: CCN Type: RHSA-2010-0807 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0873 Critical: java-1.5.0-ibm security update
Source: CCN Type: RHSA-2010-0935 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2010-0987 Critical: java-1.6.0-ibm security and bug fix update
Source: CCN Type: RHSA-2011-0152 Moderate: java-1.4.2-ibm security update
Source: CCN Type: RHSA-2011-0880 Low: Red Hat Network Satellite server IBM Java Runtime security update
Source: CCN Type: SA18251 Cpio Large File Size Handling Denial of Service Vulnerability
Source: CCN Type: SA38869 GNU Cpio "rmt" Buffer Overflow Vulnerability
Source: CCN Type: SA39762 Kerberos GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA39845 PostgreSQL Two Vulnerabilities
Source: CCN Type: SA40145 Samba SMB1 Packet Chaining Memory Corruption Vulnerability
Source: CCN Type: SA41196 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA41262 VMware ESX Server Multiple Vulnerabilities
Source: CCN Type: SA41600 Sun Solaris Samba SMB1 Packet Chaining Memory Corruption Vulnerability
Source: CCN Type: SA41602 Sun Solaris GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA42280 VMware ESX / ESXi Server Update for Multiple Packages
Source: CCN Type: SA42402 Oracle Solaris Perl Safe Module Security Bypass
Source: CCN Type: SA42974 Oracle JRockit Multiple Vulnerabilities
Source: CCN Type: SA43335 Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability
Source: CCN Type: SA43887 Xerox WorkCentre Samba SMB1 Packet Chaining Vulnerability
Source: CCN Type: SA47305 F5 Enterprise Manager Multiple Vulnerabilities
Source: CCN Type: SECTRACK ID: 1023988 PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges
Source: CCN Type: SECTRACK ID: 1024062 Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed
Source: CCN Type: SECTRACK ID: 1024107 Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code
Source: CCN Type: Apple Web site About Security Update 2010-005
Source: CCN Type: F5 Networks Web site Release Note: Enterprise Manager version 2.3.0
Source: DEBIAN Type: DSA-2052 krb5 -- null pointer dereference
Source: DEBIAN Type: DSA-2061 samba -- memory corruption
Source: DEBIAN Type: DSA-2267 perl -- restriction bypass
Source: CCN Type: Oracle Critical Patch Update Advisory - July 2011 Oracle Critical Patch Update Advisory - July 2011
Source: CCN Type: OSVDB ID: 22194 cpio on 64-bit Large File Size Handling Overflow
Source: CCN Type: OSVDB ID: 62950 GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow
Source: CCN Type: OSVDB ID: 64744 MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS
Source: CCN Type: OSVDB ID: 64756 PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)
Source: CCN Type: OSVDB ID: 65518 Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption
Source: CCN Type: Samba Web site Samba 3.0.x to 3.3.12 are affected by a memory corruption vulnerability.
Source: CCN Type: BID-16057 CPIO File Size Stack Buffer Overflow Vulnerability
Source: CCN Type: BID-40235 MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability
Source: CCN Type: BID-40305 Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities
Source: CCN Type: BID-40884 Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability
Source: CCN Type: XRX11-002 Software Update to Address Buffer Overflow
Source: XF Type: UNKNOWN samba-smb1-code-execution(59481)
Source: CCN Type: iDefense Labs Public Advisory: 06.16.10 Samba 3.3.12 Memory Corruption Vulnerability
Source: SUSE Type: SUSE-SA:2010:025 Samba security update
Source: SUSE Type: SUSE-SA:2011:006 IBM Java 6 security update
Source: SUSE Type: SUSE-SA:2011:014 IBM Java security update
Source: SUSE Type: SUSE-SR:2010:011 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:013 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:015 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:016 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2010:019 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2011:008 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.1:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.6:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.7:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.10:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.26a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.27a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.5:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.11:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.12:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.14:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.14a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.15:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.16:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.17:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.18:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.19:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.20:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.20a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.20b:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.21:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.22:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.23:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.23a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.23b:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.23c:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.23d:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.24:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.21a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.21b:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.21c:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.13:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.26:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25b:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25c:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.8:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.9:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25:pre1:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25:pre2:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25:rc1:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25:rc2:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.25:rc3:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.27:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.4:rc1:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.28a:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.29:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.0:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.2:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.3:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.4:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.31:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.32:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.33:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.5:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.6:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.30:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.1:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.12:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.5:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.34:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.28:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.0:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.10:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.9:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.8:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.7:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.6:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.4:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.3:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.2:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.1:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.15:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.14:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.13:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.11:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.10:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.9:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.8:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2.7:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.37:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.36:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.0.35:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.11:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3.12:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.1.0:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.2:*:*:*:*:*:*:*OR cpe:/a:samba:samba:3.3:*:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*OR cpe:/o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*OR cpe:/h:xerox:workcentre_5755:-:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
gnu cpio 2.6-8
gnu tar 1.22
gnu cpio 2.10
sun solaris 9.0
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
quest intrust knowledge pack for sun solaris 10.2.5.1024
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat rhel extras 4
novell suse linux enterprise server 10
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
vmware esx server 3.0.0
suse novell linux pos 9
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
novell open enterprise server *
novell opensuse 11.0
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
vmware esx server 4.0
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010
redhat enterprise linux 6
f5 enterprise manager 2.0
redhat enterprise linux server supplementary 6.0
redhat enterprise linux workstation supplementary 6.0
redhat enterprise linux desktop supplementary 6.0
redhat enterprise linux hpc node supplementary 6.0
ibm flex system manager node *
larry_wall perl 5.8.0
larry_wall perl 5.8.3
larry_wall perl 5.9.2
larry_wall perl 5.8.6
postgresql postgresql 8.0
postgresql postgresql 8.1
postgresql postgresql 8.2
postgresql postgresql 7.4
larry_wall perl 5.8.1
larry_wall perl 5.8.8
postgresql postgresql 8.3
postgresql postgresql 8.4
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat rhel extras 4
novell suse linux enterprise server 10
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
vmware esx server 3.0.0
suse novell linux pos 9
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
novell open enterprise server *
novell opensuse 11.0
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
vmware esx server 4.0
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010
redhat enterprise linux 6
f5 enterprise manager 2.0
redhat enterprise linux server supplementary 6.0
redhat enterprise linux workstation supplementary 6.0
redhat enterprise linux desktop supplementary 6.0
redhat enterprise linux hpc node supplementary 6.0
oracle database server *
mit kerberos 5-1.1
mit kerberos 5-1.3
mit kerberos 5-1.5
mit kerberos 5-1.2.2
mit kerberos 5-1.6.3
mit kerberos 5
mit kerberos 5-1.2
mit kerberos 5-1.2.1
mit kerberos 5-1.2.3
mit kerberos 5-1.2.4
mit kerberos 5-1.2.5
mit kerberos 5-1.2.6
mit kerberos 5-1.2.7
mit kerberos 5-1.2.8
mit kerberos 5-1.3.1
mit kerberos 5-1.3.2
mit kerberos 5-1.3.3
mit kerberos 5-1.3.4
mit kerberos 5-1.3.5
mit kerberos 5-1.3.6
mit kerberos 5-1.4
mit kerberos 5-1.4.1
mit kerberos 5-1.4.2
mit kerberos 5-1.4.3
mit kerberos 5-1.4.4
mit kerberos 5-1.5.1
mit kerberos 5-1.5.2
mit kerberos 5-1.5.3
mit kerberos 5-1.6
mit kerberos 5-1.6.1
mit kerberos 5-1.6.2
mit kerberos 5-1.3 alpha1
mit kerberos 5_1.0
mit kerberos 5_1.0.6
mit kerberos 5_1.1
mit kerberos 5_1.1.1
mit kerberos 5_1.2 beta1
mit kerberos 5_1.2 beta2
mit kerberos 5_1.3.3
mit kerberos 5-1.7
mit kerberos 5-1.7.1
mit kerberos 5-1.8
mit kerberos 5-1.8.1
mit kerberos 5-1.8 alpha
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat rhel extras 4
canonical ubuntu 6.06
novell suse linux enterprise server 10
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
vmware esx server 3.0.0
suse novell linux pos 9
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
avaya communication manager 5.0
novell open enterprise server *
canonical ubuntu 8.04
novell opensuse 11.0
avaya communication manager 5.1
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
vmware esx server 4.0
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010
redhat enterprise linux 6
f5 enterprise manager 2.0
redhat enterprise linux server supplementary 6.0
redhat enterprise linux workstation supplementary 6.0
redhat enterprise linux desktop supplementary 6.0
redhat enterprise linux hpc node supplementary 6.0
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.6
samba samba 3.0.4
samba samba 3.0.7
samba samba 3.0.10
samba samba 3.0.26a
samba samba 3.0.27a
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.0
samba samba 3.0.5
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.13
samba samba 3.0.26
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.25 pre1
samba samba 3.0.25 pre2
samba samba 3.0.25 rc1
samba samba 3.0.25 rc2
samba samba 3.0.25 rc3
samba samba 3.0.27
samba samba 3.0.4 rc1
samba samba 3.0.28a
samba samba 3.0.29
samba samba 3.2.0
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.0.30
samba samba 3.2.1
samba samba 3.2.12
samba samba 3.3.5
samba samba 3.0.34
samba samba 3.0.28
samba samba 3.3.0
samba samba 3.3.10
samba samba 3.3.9
samba samba 3.3.8
samba samba 3.3.7
samba samba 3.3.6
samba samba 3.3.4
samba samba 3.3.3
samba samba 3.3.2
samba samba 3.3.1
samba samba 3.2.15
samba samba 3.2.14
samba samba 3.2.13
samba samba 3.2.11
samba samba 3.2.10
samba samba 3.2.9
samba samba 3.2.8
samba samba 3.2.7
samba samba 3.0.37
samba samba 3.0.36
samba samba 3.0.35
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.1.0
samba samba 3.2
samba samba 3.3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
mandrakesoft mandrake multi network firewall 2.0
redhat rhel extras 4
novell suse linux enterprise server 10
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
vmware esx server 3.0.0
suse novell linux pos 9
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
novell open enterprise server *
novell opensuse 11.0
mandriva linux 2009.0
mandriva linux 2009.0 -
debian debian linux 5.0
mandriva linux 2009.1
mandriva linux 2009.1
apple mac os x 10.5.8
apple mac os x server 10.5.8
vmware esx server 4.0
apple mac os x server 10.6.4
apple mac os x 10.6.4
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010
xerox workcentre 5755 -
redhat enterprise linux 6
f5 enterprise manager 2.0
redhat enterprise linux server supplementary 6.0
redhat enterprise linux workstation supplementary 6.0
redhat enterprise linux desktop supplementary 6.0
redhat enterprise linux hpc node supplementary 6.0