Vulnerability Name: | CVE-2007-0906 (CCN-32485) |
Assigned: | 2007-02-14 |
Published: | 2007-02-14 |
Updated: | 2018-10-30 |
Summary: | Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. Note: vector 6 might actually be an integer overflow (CVE-2007-1885). Note: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825). |
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-119
|
Vulnerability Consequences: | Gain Access |
References: | Source: SGI Type: UNKNOWN 20070201-01-P
Source: MITRE Type: CNA CVE-2007-0906
Source: SUSE Type: UNKNOWN SUSE-SA:2007:044
Source: SUSE Type: UNKNOWN SUSE-SA:2007:020
Source: OSVDB Type: UNKNOWN 34706
Source: OSVDB Type: UNKNOWN 34707
Source: OSVDB Type: UNKNOWN 34708
Source: OSVDB Type: UNKNOWN 34709
Source: OSVDB Type: UNKNOWN 34710
Source: OSVDB Type: UNKNOWN 34711
Source: OSVDB Type: UNKNOWN 34712
Source: OSVDB Type: UNKNOWN 34713
Source: OSVDB Type: UNKNOWN 34714
Source: OSVDB Type: UNKNOWN 34715
Source: CCN Type: RHSA-2007-0076 Important: php security update
Source: CCN Type: RHSA-2007-0081 Important: php security update
Source: CCN Type: RHSA-2007-0082 Important: php security update
Source: CCN Type: RHSA-2007-0088 Important: php security update
Source: CCN Type: RHSA-2007-0089 Important: php security update for Stronghold
Source: REDHAT Type: Vendor Advisory RHSA-2007:0089
Source: CCN Type: SA24089 PHP Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 24089
Source: SECUNIA Type: Vendor Advisory 24195
Source: SECUNIA Type: Vendor Advisory 24217
Source: SECUNIA Type: Vendor Advisory 24236
Source: SECUNIA Type: Vendor Advisory 24248
Source: SECUNIA Type: Vendor Advisory 24284
Source: SECUNIA Type: Vendor Advisory 24295
Source: SECUNIA Type: Vendor Advisory 24322
Source: SECUNIA Type: Vendor Advisory 24419
Source: SECUNIA Type: Vendor Advisory 24421
Source: CCN Type: SA24432 Avaya Products PHP Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 24432
Source: SECUNIA Type: Vendor Advisory 24514
Source: SECUNIA Type: Vendor Advisory 24606
Source: CCN Type: SA24642 Avaya Products php Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 24642
Source: SECUNIA Type: Vendor Advisory 24945
Source: SECUNIA Type: Vendor Advisory 26048
Source: GENTOO Type: UNKNOWN GLSA-200703-21
Source: CCN Type: SECTRACK ID: 1017671 PHP Buffer Overflows and Format String Bugs Permit Code Execution and Denial of Service
Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2007-101.htm
Source: CCN Type: ASA-2007-101 php security update (RHSA-2007-0076)
Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2007-136.htm
Source: CCN Type: ASA-2007-136 php security update (RHSA-2007-081 RHSA-2007-0088)
Source: DEBIAN Type: DSA-1264 php4 -- several vulnerabilities
Source: CCN Type: GLSA-200703-21 PHP: Multiple vulnerabilities
Source: MANDRIVA Type: UNKNOWN MDKSA-2007:048
Source: CCN Type: OpenPKG-SA-2007.010 php
Source: OPENPKG Type: UNKNOWN OpenPKG-SA-2007.010
Source: OSVDB Type: UNKNOWN 32776
Source: CCN Type: OSVDB ID: 32776 PHP Session Extension php_binary Heap Information Disclosure
Source: CCN Type: OSVDB ID: 34706 PHP Session Extension Unspecified Overflow
Source: CCN Type: OSVDB ID: 34707 PHP zip Extension Unspecified Overflow
Source: CCN Type: OSVDB ID: 34708 PHP imap Extension Unspecified Overflow
Source: CCN Type: OSVDB ID: 34709 PHP sqlite Extension Unspecified Overflow
Source: CCN Type: OSVDB ID: 34710 PHP stream Filters Unspecified Overflow
Source: CCN Type: OSVDB ID: 34711 PHP str_replace() Function Unspecified Overflow
Source: CCN Type: OSVDB ID: 34712 PHP mail() Function Unspecified Overflow
Source: CCN Type: OSVDB ID: 34713 PHP ibase_delete_user() Function Unspecified Overflow
Source: CCN Type: OSVDB ID: 34714 PHP ibase_add_user() Function Unspecified Overflow
Source: CCN Type: OSVDB ID: 34715 PHP ibase_modify_user() Function Unspecified Overflow
Source: CONFIRM Type: UNKNOWN http://www.php.net/ChangeLog-5.php#5.2.1
Source: CCN Type: The PHP Group Web site Downloads- PHP 5.2.1
Source: CONFIRM Type: UNKNOWN http://www.php.net/releases/5_2_1.php
Source: REDHAT Type: UNKNOWN RHSA-2007:0076
Source: REDHAT Type: Vendor Advisory RHSA-2007:0081
Source: REDHAT Type: Vendor Advisory RHSA-2007:0082
Source: REDHAT Type: Vendor Advisory RHSA-2007:0088
Source: BUGTRAQ Type: UNKNOWN 20070227 rPSA-2007-0043-1 php php-mysql php-pgsql
Source: BUGTRAQ Type: UNKNOWN 20070418 rPSA-2007-0073-1 php php-mysql php-pgsql
Source: BID Type: Patch 22496
Source: CCN Type: BID-22496 PHP 5.2.0 and Prior Versions Multiple Vulnerabilities
Source: SECTRACK Type: UNKNOWN 1017671
Source: TRUSTIX Type: UNKNOWN 2007-0009
Source: CCN Type: TLSA-2007-20 Multiple vulnerabilities in php
Source: CCN Type: USN-424-1 PHP vulnerabilities
Source: UBUNTU Type: UNKNOWN USN-424-1
Source: CCN Type: USN-424-2 PHP regression
Source: UBUNTU Type: UNKNOWN USN-424-2
Source: DEBIAN Type: UNKNOWN DSA-1264
Source: VUPEN Type: UNKNOWN ADV-2007-0546
Source: XF Type: UNKNOWN php-multiple-unspecified-bo(32485)
Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-1088
Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-1268
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:8992
Source: SUSE Type: SUSE-SA:2007:020 PHP security problems
|
Vulnerable Configuration: | Configuration 1: cpe:/a:php:php:3.0:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.1:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.2:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.3:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.4:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.5:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.6:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.7:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.8:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.9:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.10:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.11:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.12:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.13:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.14:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.15:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.16:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.17:*:*:*:*:*:*:*OR cpe:/a:php:php:3.0.18:*:*:*:*:*:*:*OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:*OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0.1:patch1:*:*:*:*:*:*OR cpe:/a:php:php:4.0.1:patch2:*:*:*:*:*:*OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*OR cpe:/a:php:php:4.0.3:patch1:*:*:*:*:*:*OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0.7:rc1:*:*:*:*:*:*OR cpe:/a:php:php:4.0.7:rc2:*:*:*:*:*:*OR cpe:/a:php:php:4.0.7:rc3:*:*:*:*:*:*OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*OR cpe:/a:php:php:4.2:*:dev:*:*:*:*:*OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*OR cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*OR cpe:/a:php:php:4.3.9:*:*:*:*:*:*:*OR cpe:/a:php:php:4.3.10:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.11:-:*:*:*:*:*:*OR cpe:/a:php:php:4.4.0:-:*:*:*:*:*:*OR cpe:/a:php:php:4.4.1:-:*:*:*:*:*:*OR cpe:/a:php:php:4.4.2:-:*:*:*:*:*:*OR cpe:/a:php:php:4.4.3:-:*:*:*:*:*:*OR cpe:/a:php:php:4.4.4:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0:rc1:*:*:*:*:*:*OR cpe:/a:php:php:5.0:rc2:*:*:*:*:*:*OR cpe:/a:php:php:5.0:rc3:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:* Configuration 2: cpe:/o:trustix:secure_linux:2.2:*:*:*:*:*:*:*OR cpe:/o:trustix:secure_linux:3.0:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration RedHat 6: cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 7: cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration CCN 1: cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*AND cpe:/a:redhat:stronghold:-:*:*:*:*:*:*:*OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.opensuse.security:def:20070906 | V | CVE-2007-0906 | 2017-09-27 | oval:org.mitre.oval:def:22487 | P | ELSA-2007:0082: php security update (Important) | 2014-05-26 | oval:org.mitre.oval:def:8992 | V | Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions. NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885). NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825). | 2013-04-29 | oval:com.redhat.rhsa:def:20070076 | P | RHSA-2007:0076: php security update (Important) | 2008-03-20 | oval:com.redhat.rhsa:def:20070082 | P | RHSA-2007:0082: php security update (Important) | 2008-03-20 | oval:org.debian:def:1264 | V | several vulnerabilities | 2007-03-07 |
|
BACK |
php php 3.0
php php 3.0.1
php php 3.0.2
php php 3.0.3
php php 3.0.4
php php 3.0.5
php php 3.0.6
php php 3.0.7
php php 3.0.8
php php 3.0.9
php php 3.0.10
php php 3.0.11
php php 3.0.12
php php 3.0.13
php php 3.0.14
php php 3.0.15
php php 3.0.16
php php 3.0.17
php php 3.0.18
php php 4.0
php php 4.0.1
php php 4.0.1 patch1
php php 4.0.1 patch2
php php 4.0.2
php php 4.0.3
php php 4.0.3 patch1
php php 4.0.4
php php 4.0.5
php php 4.0.6
php php 4.0.7
php php 4.0.7 rc1
php php 4.0.7 rc2
php php 4.0.7 rc3
php php 4.1.0
php php 4.1.1
php php 4.1.2
php php 4.2
php php 4.2.0
php php 4.2.1
php php 4.2.2
php php 4.2.3
php php 4.3.0
php php 4.3.1
php php 4.3.2
php php 4.3.3
php php 4.3.4
php php 4.3.5
php php 4.3.6
php php 4.3.7
php php 4.3.8
php php 4.3.9
php php 4.3.10
php php 4.3.11
php php 4.4.0
php php 4.4.1
php php 4.4.2
php php 4.4.3
php php 4.4.4
php php 5.0 rc1
php php 5.0 rc2
php php 5.0 rc3
php php 5.0.0
php php 5.0.1
php php 5.0.2
php php 5.0.3
php php 5.0.4
php php 5.0.5
php php 5.1.0
php php 5.1.1
php php 5.1.2
php php 5.1.3
php php 5.1.4
php php 5.1.5
php php 5.1.6
php php 5.2.0
trustix secure linux 2.2
trustix secure linux 3.0
php php 5.0.3
php php 5.0.4
php php 5.0.0
php php 5.0.5
php php 5.1.1
php php 5.1.2
php php 5.1.4
php php 5.0.2
php php 5.1.6
php php 5.2.0
php php 5.0.0 beta1
php php 5.0.0 beta2
php php 5.0.0 beta3
php php 5.0.0 beta4
php php 5.0.0 rc1
php php 5.0.0 rc2
php php 5.0.0 rc3
php php 5.0.1
php php 5.1.0
php php 5.1.3
php php 5.1.5
redhat stronghold -
openpkg openpkg current
gentoo linux *
suse linux enterprise server 8
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
novell open enterprise server *
mandrakesoft mandrake multi network firewall 2.0
suse suse linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
canonical ubuntu 6.06
suse suse linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
turbolinux turbolinux personal *
turbolinux turbolinux home *
turbolinux turbolinux multimedia *
redhat enterprise linux desktop 5.0
redhat enterprise linux 5
redhat enterprise linux 5
novell open enterprise server *
novell opensuse 10.2
suse suse linux 9.3