Vulnerability Name:

CVE-2007-6111 (CCN-38738)

Assigned:2007-11-22
Published:2007-11-22
Updated:2018-10-15
Summary:Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MISC
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=199958

Source: MITRE
Type: CNA
CVE-2007-6111

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:004

Source: CCN
Type: RHSA-2008-0058
Moderate: wireshark security update

Source: CCN
Type: SA27777
Wireshark Multiple Denial of Service Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
27777

Source: SECUNIA
Type: UNKNOWN
28197

Source: SECUNIA
Type: UNKNOWN
28207

Source: SECUNIA
Type: UNKNOWN
28288

Source: SECUNIA
Type: UNKNOWN
28304

Source: SECUNIA
Type: UNKNOWN
28325

Source: SECUNIA
Type: UNKNOWN
28564

Source: SECUNIA
Type: UNKNOWN
29048

Source: GENTOO
Type: UNKNOWN
GLSA-200712-23

Source: CCN
Type: SECTRACK ID: 1018988
Wireshark Wireshark MP3, DNP, SSL, ANSI MAP, Firebird/Interbase, NCP, HTTP, MEGACO, DCP ETSI, OS/400, PPP, Bluetooth SDP, and RPC Portmap Bugs Let Remote Users Deny Service

Source: SECTRACK
Type: UNKNOWN
1018988

Source: CCN
Type: ASA-2008-093
wireshark security update (RHSA-2008-0058)

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0004

Source: CCN
Type: GLSA-200712-23
Wireshark: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:001

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:1

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0058

Source: BUGTRAQ
Type: UNKNOWN
20080103 rPSA-2008-0004-1 tshark wireshark

Source: BID
Type: Patch
26532

Source: CCN
Type: BID-26532
Wireshark 0.99.6 Multiple Remote Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2007-3956

Source: CCN
Type: Wireshark Web site
Wireshark: Download

Source: CCN
Type: wnpa-sec-2007-03
Multiple problems in Wireshark® (formerly Ethereal®) versions 0.8.16 to 0.99.5

Source: CONFIRM
Type: Patch
http://www.wireshark.org/security/wnpa-sec-2007-03.html

Source: XF
Type: UNKNOWN
wireshark-mp3-dos(38738)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1975

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9048

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-4590

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-4690

Source: SUSE
Type: SUSE-SR:2008:004
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ethereal_group:ethereal:0.7.7:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.9:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.11:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.12:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.15:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.16:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.17:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.17a:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.8.20:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.9_.0:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.0a:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.10.14:*:*:*:*:*:*:*
  • OR cpe:/a:ethereal_group:ethereal:0.99.0:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2007-6111 (CCN-38743)

    Assigned:2007-11-22
    Published:2007-11-22
    Updated:2007-11-22
    Summary:Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
    5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-2007-6111

    Source: CCN
    Type: RHSA-2008-0058
    Moderate: wireshark security update

    Source: CCN
    Type: SA27777
    Wireshark Multiple Denial of Service Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1018988
    Wireshark Wireshark MP3, DNP, SSL, ANSI MAP, Firebird/Interbase, NCP, HTTP, MEGACO, DCP ETSI, OS/400, PPP, Bluetooth SDP, and RPC Portmap Bugs Let Remote Users Deny Service

    Source: CCN
    Type: ASA-2008-093
    wireshark security update (RHSA-2008-0058)

    Source: CCN
    Type: GLSA-200712-23
    Wireshark: Multiple vulnerabilities

    Source: CCN
    Type: BID-26532
    Wireshark 0.99.6 Multiple Remote Vulnerabilities

    Source: CCN
    Type: Wireshark Web site
    Wireshark: Download

    Source: CCN
    Type: wnpa-sec-2007-03
    Multiple problems in Wireshark® (formerly Ethereal®) versions 0.8.16 to 0.99.5

    Source: XF
    Type: UNKNOWN
    wireshark-ncp-dissector-dos(38743)

    Source: SUSE
    Type: SUSE-SR:2008:004
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*
  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora_core:-:*:*:*:*:*:*:*
  • OR cpe:/a:rpath:rpath_linux:1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:rpath:linux:2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:es:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20076111
    V
    CVE-2007-6111
    2015-11-16
    oval:org.mitre.oval:def:22589
    P
    ELSA-2008:0058: wireshark security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:9048
    V
    Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
    2013-04-29
    oval:com.redhat.rhsa:def:20080058
    P
    RHSA-2008:0058: wireshark security update (Moderate)
    2008-01-28
    BACK
    ethereal_group ethereal 0.7.7
    ethereal_group ethereal 0.8
    ethereal_group ethereal 0.8.4
    ethereal_group ethereal 0.8.5
    ethereal_group ethereal 0.8.6
    ethereal_group ethereal 0.8.7
    ethereal_group ethereal 0.8.8
    ethereal_group ethereal 0.8.9
    ethereal_group ethereal 0.8.10
    ethereal_group ethereal 0.8.11
    ethereal_group ethereal 0.8.12
    ethereal_group ethereal 0.8.13
    ethereal_group ethereal 0.8.14
    ethereal_group ethereal 0.8.15
    ethereal_group ethereal 0.8.16
    ethereal_group ethereal 0.8.17
    ethereal_group ethereal 0.8.17a
    ethereal_group ethereal 0.8.18
    ethereal_group ethereal 0.8.19
    ethereal_group ethereal 0.8.20
    ethereal_group ethereal 0.9
    ethereal_group ethereal 0.9.0
    ethereal_group ethereal 0.9.1
    ethereal_group ethereal 0.9.2
    ethereal_group ethereal 0.9.3
    ethereal_group ethereal 0.9.4
    ethereal_group ethereal 0.9.5
    ethereal_group ethereal 0.9.6
    ethereal_group ethereal 0.9.7
    ethereal_group ethereal 0.9.8
    ethereal_group ethereal 0.9.9
    ethereal_group ethereal 0.9.10
    ethereal_group ethereal 0.9.11
    ethereal_group ethereal 0.9.12
    ethereal_group ethereal 0.9.13
    ethereal_group ethereal 0.9.14
    ethereal_group ethereal 0.9.15
    ethereal_group ethereal 0.9.16
    ethereal_group ethereal 0.9_.0
    ethereal_group ethereal 0.10
    ethereal_group ethereal 0.10.0
    ethereal_group ethereal 0.10.0a
    ethereal_group ethereal 0.10.1
    ethereal_group ethereal 0.10.2
    ethereal_group ethereal 0.10.3
    ethereal_group ethereal 0.10.4
    ethereal_group ethereal 0.10.5
    ethereal_group ethereal 0.10.6
    ethereal_group ethereal 0.10.7
    ethereal_group ethereal 0.10.8
    ethereal_group ethereal 0.10.9
    ethereal_group ethereal 0.10.10
    ethereal_group ethereal 0.10.11
    ethereal_group ethereal 0.10.12
    ethereal_group ethereal 0.10.13
    ethereal_group ethereal 0.10.14
    ethereal_group ethereal 0.99.0
    wireshark wireshark 0.7.9
    wireshark wireshark 0.8.16
    wireshark wireshark 0.9.8
    wireshark wireshark 0.9.10
    wireshark wireshark 0.99
    wireshark wireshark 0.99.0
    wireshark wireshark 0.99.1
    wireshark wireshark 0.99.2
    wireshark wireshark 0.99.3
    wireshark wireshark 0.99.4
    wireshark wireshark 0.99.5
    wireshark wireshark 0.99.6
    wireshark wireshark 0.99.6
    freebsd freebsd *
    netbsd netbsd *
    debian debian linux *
    gentoo linux *
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux *
    fedoraproject fedora core -
    rpath rpath linux 1
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    microsoft windows vista *
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    rpath linux 2
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    redhat enterprise linux 4.6.z ga
    redhat enterprise linux 4.6.z ga