Vulnerability Name:

CVE-2007-1352 (CCN-33419)

Assigned:2007-04-03
Published:2007-04-03
Updated:2018-10-16
Summary:Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
CVSS v3 Severity:8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:3.8 Low (CVSS v2 Vector: AV:A/AC:M/Au:S/C:N/I:P/A:P)
2.8 Low (Temporal CVSS v2 Vector: AV:A/AC:M/Au:S/C:N/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
6.2 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
4.6 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2007-1352

Source: CONFIRM
Type: UNKNOWN
http://issues.foresightlinux.org/browse/FL-223

Source: IDEFENSE
Type: UNKNOWN
20070403 Multiple Vendor X Server fonts.dir File Parsing Integer Overflow Vulnerability

Source: APPLE
Type: UNKNOWN
APPLE-SA-2007-11-14

Source: APPLE
Type: UNKNOWN
APPLE-SA-2009-02-12

Source: MLIST
Type: UNKNOWN
[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont

Source: CCN
Type: RHSA-2007-0125
Important: XFree86 security update

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0125

Source: CCN
Type: RHSA-2007-0126
Important: xorg-x11 security update

Source: CCN
Type: RHSA-2007-0132
Important: libXfont security update

Source: CCN
Type: SA24741
X.Org X11 Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
24741

Source: SECUNIA
Type: UNKNOWN
24745

Source: SECUNIA
Type: Patch, Vendor Advisory
24756

Source: CCN
Type: SA24758
XFree86 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
24758

Source: SECUNIA
Type: UNKNOWN
24765

Source: SECUNIA
Type: Patch, Vendor Advisory
24770

Source: SECUNIA
Type: UNKNOWN
24771

Source: SECUNIA
Type: UNKNOWN
24772

Source: SECUNIA
Type: UNKNOWN
24791

Source: SECUNIA
Type: UNKNOWN
25004

Source: CCN
Type: SA25006
Sun Solaris X11 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
25006

Source: SECUNIA
Type: UNKNOWN
25195

Source: CCN
Type: SA25216
Avaya CMS / IR X.Org X11 Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
25216

Source: SECUNIA
Type: UNKNOWN
25305

Source: CCN
Type: SA33937
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
33937

Source: GENTOO
Type: UNKNOWN
GLSA-200705-10

Source: CCN
Type: SECTRACK ID: 1017857
X11 Overflows Let Local Users Gain Root Privileges

Source: CCN
Type: Sun Alert ID: 102886
Multiple vulnerabilities in libfreetype, Xsun(1) and Xorg(1)

Source: SUNALERT
Type: UNKNOWN
102886

Source: CCN
Type: Apple Web site
About the security content of Security Update 2009-001

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3438

Source: CCN
Type: ASA-2007-141
xorg-x11 security update (RHSA-2007-0126)

Source: CCN
Type: ASA-2007-167
XFree86 security update (RHSA-2007-0125)

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm

Source: CCN
Type: ASA-2007-178
Multiple vulnerabilities in libfreetype Xsun(1)sand Xorg(1) (Sun 102886)

Source: CCN
Type: Apple Safari Web site
Apple - Safari 3 Public Beta

Source: DEBIAN
Type: UNKNOWN
DSA-1294

Source: DEBIAN
Type: DSA-1294
xfree86 -- several vulnerabilities

Source: CCN
Type: GLSA-200705-10
LibXfont, TightVNC: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:079

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:080

Source: SUSE
Type: UNKNOWN
SUSE-SA:2007:027

Source: OPENBSD
Type: UNKNOWN
[3.9] 021: SECURITY FIX: April 4, 2007

Source: OPENBSD
Type: UNKNOWN
[4.0] 011: SECURITY FIX: April 4, 2007

Source: REDHAT
Type: Vendor Advisory
RHSA-2007:0126

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0132

Source: BUGTRAQ
Type: UNKNOWN
20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs

Source: BUGTRAQ
Type: UNKNOWN
20070405 FLEA-2007-0009-1: xorg-x11 freetype

Source: BID
Type: UNKNOWN
23283

Source: CCN
Type: BID-23283
X.Org LibXFont Multiple Local Integer Overflow Vulnerabilities

Source: BID
Type: UNKNOWN
23300

Source: CCN
Type: BID-23300
ImageMagick XGetPixel/XInitImage Multiple Integer Overflow Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1017857

Source: CCN
Type: TLSA-2007-26
Multiple vulnerabilities in xorg-x11

Source: CCN
Type: USN-448-1
X.org vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-448-1

Source: VUPEN
Type: UNKNOWN
ADV-2007-1217

Source: VUPEN
Type: UNKNOWN
ADV-2007-1548

Source: CCN
Type: X.Org Foundation Web site
X.Org Wiki - Home

Source: XF
Type: UNKNOWN
xorg-fontsdir-bo(33419)

Source: XF
Type: UNKNOWN
xorg-fontsdir-bo(33419)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1213

Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 04.03.07
Multiple Vendor X Server fonts.dir File Parsing Integer Overflow Vulnerability

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10523

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:13243

Source: SUSE
Type: SUSE-SA:2007:027
XFree86Xorg security problems

Vulnerable Configuration:Configuration 1:
  • cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • AND
  • cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:9.0:*:i386:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:turbolinux:turbolinux:10.0:*:*:*:desktop:*:*:*

  • Configuration 6:
  • cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:rpath:linux:1:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:4.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:x:x.org_x11:7.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::64bit:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20071352
    V
    CVE-2007-1352
    2015-11-16
    oval:org.mitre.oval:def:22675
    P
    ELSA-2007:0132: libXfont security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:10523
    V
    Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
    2013-04-29
    oval:com.redhat.rhsa:def:20070125
    P
    RHSA-2007:0125: XFree86 security update (Important)
    2008-03-20
    oval:com.redhat.rhsa:def:20070126
    P
    RHSA-2007:0126: xorg-x11 security update (Important)
    2008-03-20
    oval:org.mitre.oval:def:13243
    V
    Multiple vulnerabilities in libfreetype, Xsun(1) and Xorg(1)
    2007-09-06
    oval:org.debian:def:1294
    V
    several vulnerabilities
    2007-05-17
    oval:com.redhat.rhsa:def:20070132
    P
    RHSA-2007:0132: libXfont security update (Important)
    2007-04-03
    BACK
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake multi network firewall 2.0
    x.org libxfont 1.2.2
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux 3.0
    redhat enterprise linux 4.0
    redhat enterprise linux 4.0
    redhat enterprise linux 4.0
    redhat enterprise linux desktop 3.0
    redhat enterprise linux desktop 4.0
    redhat enterprise linux desktop 5.0
    redhat enterprise linux desktop 5.0
    redhat fedora core core_1.0
    redhat linux 9.0
    redhat linux advanced workstation 2.1
    redhat linux advanced workstation 2.1
    slackware slackware linux 9.0
    slackware slackware linux 9.1
    slackware slackware linux current
    turbolinux turbolinux desktop 10.0
    ubuntu ubuntu linux 4.1
    ubuntu ubuntu linux 4.1
    ubuntu ubuntu linux 4.1
    ubuntu ubuntu linux 5.10
    ubuntu ubuntu linux 5.10
    ubuntu ubuntu linux 5.10
    ubuntu ubuntu linux 5.10
    ubuntu ubuntu linux 6.06_lts
    ubuntu ubuntu linux 6.06_lts
    ubuntu ubuntu linux 6.06_lts
    ubuntu ubuntu linux 6.06_lts
    ubuntu ubuntu linux 6.10
    ubuntu ubuntu linux 6.10
    ubuntu ubuntu linux 6.10
    ubuntu ubuntu linux 6.10
    rpath linux 1
    openbsd openbsd 3.9
    openbsd openbsd 4.0
    x x.org x11 7.1
    sun solaris 8
    sun solaris 9
    gentoo linux *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    suse suse linux 9.0
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    sun solaris 10
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    novell open enterprise server *
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    microsoft windows vista *
    turbolinux turbolinux fuji
    turbolinux turbolinux personal *
    turbolinux turbolinux home *
    turbolinux turbolinux multimedia *
    redhat enterprise linux desktop 5.0
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    apple mac os x 10.4.11
    apple mac os x server 10.4.11
    novell open enterprise server *
    novell opensuse 10.2