Vulnerability Name: CVE-2008-3111 (CCN-43664) Assigned: 2008-07-08 Published: 2008-07-08 Updated: 2018-10-30 Summary: Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-119 CWE-20 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2008-3111 Source: APPLE Type: UNKNOWNAPPLE-SA-2008-09-24 Source: SUSE Type: UNKNOWNSUSE-SA:2008:042 Source: SUSE Type: UNKNOWNSUSE-SA:2008:043 Source: SUSE Type: UNKNOWNSUSE-SA:2008:045 Source: BUGTRAQ Type: UNKNOWN20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and Source: CCN Type: RHSA-2008-0595Critical: java-1.5.0-sun security update Source: CCN Type: RHSA-2008-0636Low: Red Hat Network Satellite Server Sun Java Runtime security update Source: CCN Type: RHSA-2008-0638Low: Red Hat Network Satellite Server IBM Java Runtime security update Source: CCN Type: RHSA-2008-0790Critical: java-1.5.0-ibm security update Source: CCN Type: SA31010Sun Java JDK / JRE Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory31010 Source: SECUNIA Type: Vendor Advisory31055 Source: SECUNIA Type: Vendor Advisory31320 Source: SECUNIA Type: Vendor Advisory31497 Source: SECUNIA Type: Vendor Advisory31600 Source: SECUNIA Type: UNKNOWN31736 Source: CCN Type: SA32018Mac OS X Java Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory32018 Source: CCN Type: SA32179VMware VirtualCenter Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory32179 Source: CCN Type: SA32180VMware ESX Server Sun Java JDK / JRE Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory32180 Source: SECUNIA Type: Vendor Advisory37386 Source: GENTOO Type: UNKNOWNGLSA-200911-02 Source: CCN Type: SECTRACK ID: 1020452Java Web Start Bugs Let Remote Users Gain Privileges on the Target System Source: CCN Type: Sun Alert ID: 238905Multiple Security Vulnerabilities in Java Web Start may allow Privileges to be Elevated Source: SUNALERT Type: Patch238905 Source: CCN Type: Apple Web siteAbout the security content of Java for Mac OS X 10.4, Release 7 Source: CONFIRM Type: UNKNOWNhttp://support.apple.com/kb/HT3178 Source: CONFIRM Type: UNKNOWNhttp://support.apple.com/kb/HT3179 Source: CCN Type: ASA-2008-303java-1.5.0-sun security update (RHSA-2008-0595) Source: CCN Type: ASA-2008-310Multiple Security Vulnerabilities in Java Web Start may allow Privileges to be Elevated (Sun 238905) Source: CCN Type: ASA-2008-330java-1.5.0-ibm security update (RHSA-2008-0790) Source: REDHAT Type: UNKNOWNRHSA-2008:0595 Source: REDHAT Type: UNKNOWNRHSA-2008:0790 Source: BUGTRAQ Type: UNKNOWN20080717 ZDI-08-043: Sun Java Web Start vm args Stack Buffer Overflow Source: BUGTRAQ Type: UNKNOWN20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues Source: BID Type: UNKNOWN30148 Source: CCN Type: BID-30148Sun Java Web Start Multiple Vulnerabilities Source: SECTRACK Type: UNKNOWN1020452 Source: CERT Type: US Government ResourceTA08-193A Source: CCN Type: VMSA-2008-0016VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues Source: CONFIRM Type: UNKNOWNhttp://www.vmware.com/security/advisories/VMSA-2008-0016.html Source: VUPEN Type: Vendor AdvisoryADV-2008-2056 Source: VUPEN Type: Vendor AdvisoryADV-2008-2740 Source: MISC Type: UNKNOWNhttp://www.zerodayinitiative.com/advisories/ZDI-08-043/ Source: XF Type: UNKNOWNsun-javawebstart-getvmargsoption-bo(43664) Source: XF Type: UNKNOWNsun-javawebstart-unspecified-bo(43664) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10541 Source: SUSE Type: SUSE-SA:2008:042Sun Java security update Source: SUSE Type: SUSE-SA:2008:045IBM Java Security update Source: CCN Type: ZDI-08-043Sun Java Web Start vm args Stack-Based Buffer Overflow Vulnerability Vulnerable Configuration: Configuration 1 :cpe:/a:sun:jdk:5.0:update_1:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_10:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_11:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_12:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_13:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_14:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_15:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_2:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_3:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_4:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_5:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_6:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_7:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_8:*:*:*:*:*:* OR cpe:/a:sun:jdk:5.0:update_9:*:*:*:*:*:* OR cpe:/a:sun:jdk:6:update_1:*:*:*:*:*:* OR cpe:/a:sun:jdk:6:update_2:*:*:*:*:*:* OR cpe:/a:sun:jdk:6:update_3:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_01:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_8:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_9:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2_17:*:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_1:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_10:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_11:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_12:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_13:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_14:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_15:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_2:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_3:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_4:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_5:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_6:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_7:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_8:*:*:*:*:*:* OR cpe:/a:sun:jre:5.0:update_9:*:*:*:*:*:* OR cpe:/a:sun:jre:6:update_1:*:*:*:*:*:* OR cpe:/a:sun:jre:6:update_2:*:*:*:*:*:* OR cpe:/a:sun:jre:6:update_3:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_01:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_02:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_03:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_04:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_05:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_06:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_07:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_08:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_09:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_10:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_11:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_12:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_13:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_14:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_15:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_16:*:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_17:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:sun:jre:1.6.0:update6:*:*:*:*:*:* OR cpe:/a:sun:jre:1.5.0:update15:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.5.0:update15:*:*:*:*:*:* OR cpe:/a:sun:jre:1.4.2:update17:*:*:*:*:*:* OR cpe:/a:sun:sdk:1.4.2_17:*:*:*:*:*:*:* OR cpe:/a:sun:jdk:1.6.0:update6:*:*:*:*:*:* AND cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.3:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.4:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:esx_server:3.5:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.0:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.2:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.5:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.6:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.4:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.5:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.1:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.2:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.4:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.5:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:* OR cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:* OR cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:* OR cpe:/a:vmware:esx_server:3.0.3:*:*:*:*:*:*:* OR cpe:/a:vmware:server:1.0.6:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:5.5.7:*:*:*:*:*:*:* OR cpe:/a:vmware:workstation:6.0.4:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:1.0.6:*:*:*:*:*:*:* OR cpe:/a:vmware:ace:2.0.4:*:*:*:*:*:*:* OR cpe:/a:vmware:virtualcenter:2.5:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20083111 V CVE-2008-3111 2017-09-27 oval:org.mitre.oval:def:22662 P ELSA-2008:0790: java-1.5.0-ibm security update (Critical) 2014-05-26 oval:org.mitre.oval:def:22640 P ELSA-2008:0595: java-1.5.0-sun security update (Critical) 2014-05-26 oval:org.mitre.oval:def:10541 V Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220. 2010-09-06 oval:com.redhat.rhsa:def:20080790 P RHSA-2008:0790: java-1.5.0-ibm security update (Critical) 2008-07-31 oval:com.redhat.rhsa:def:20080595 P RHSA-2008:0595: java-1.5.0-sun security update (Critical) 2008-07-14
BACK
sun jdk 5.0 update_1
sun jdk 5.0 update_10
sun jdk 5.0 update_11
sun jdk 5.0 update_12
sun jdk 5.0 update_13
sun jdk 5.0 update_14
sun jdk 5.0 update_15
sun jdk 5.0 update_2
sun jdk 5.0 update_3
sun jdk 5.0 update_4
sun jdk 5.0 update_5
sun jdk 5.0 update_6
sun jdk 5.0 update_7
sun jdk 5.0 update_8
sun jdk 5.0 update_9
sun jdk 6 update_1
sun jdk 6 update_2
sun jdk 6 update_3
sun jre 1.4
sun jre 1.4.2_01
sun jre 1.4.2_02
sun jre 1.4.2_03
sun jre 1.4.2_04
sun jre 1.4.2_05
sun jre 1.4.2_06
sun jre 1.4.2_07
sun jre 1.4.2_8
sun jre 1.4.2_9
sun jre 1.4.2_10
sun jre 1.4.2_11
sun jre 1.4.2_12
sun jre 1.4.2_13
sun jre 1.4.2_14
sun jre 1.4.2_15
sun jre 1.4.2_16
sun jre 1.4.2_17
sun jre 5.0 update_1
sun jre 5.0 update_10
sun jre 5.0 update_11
sun jre 5.0 update_12
sun jre 5.0 update_13
sun jre 5.0 update_14
sun jre 5.0 update_15
sun jre 5.0 update_2
sun jre 5.0 update_3
sun jre 5.0 update_4
sun jre 5.0 update_5
sun jre 5.0 update_6
sun jre 5.0 update_7
sun jre 5.0 update_8
sun jre 5.0 update_9
sun jre 6 update_1
sun jre 6 update_2
sun jre 6 update_3
sun sdk 1.4
sun sdk 1.4.2
sun sdk 1.4.2_01
sun sdk 1.4.2_02
sun sdk 1.4.2_03
sun sdk 1.4.2_04
sun sdk 1.4.2_05
sun sdk 1.4.2_06
sun sdk 1.4.2_07
sun sdk 1.4.2_08
sun sdk 1.4.2_09
sun sdk 1.4.2_10
sun sdk 1.4.2_11
sun sdk 1.4.2_12
sun sdk 1.4.2_13
sun sdk 1.4.2_14
sun sdk 1.4.2_15
sun sdk 1.4.2_16
sun sdk 1.4.2_17
sun jre 1.6.0 update6
sun jre 1.5.0 update15
sun jdk 1.5.0 update15
sun jre 1.4.2 update17
sun sdk 1.4.2_17
sun jdk 1.6.0 update6
novell linux desktop 9
apple mac os x 10.4
apple mac os x 10.4.1
apple mac os x server 10.4.1
apple mac os x server 10.4
apple mac os x server 10.4.2
apple mac os x 10.4.2
apple mac os x 10.4.4
apple mac os x 10.4.3
apple mac os x server 10.4.3
apple mac os x server 10.4.4
apple mac os x 10.4.5
apple mac os x server 10.4.5
apple mac os x 10.4.6
redhat rhel extras 4
apple mac os x server 10.4.6
apple mac os x 10.4.7
apple mac os x server 10.4.7
vmware workstation 5.5.1
apple mac os x server 10.4.8
apple mac os x 10.4.8
apple mac os x server 10.4.9
apple mac os x 10.4.9
vmware workstation 6.0
apple mac os x 10.4.10
apple mac os x server 10.4.10
apple mac os x 10.5
apple mac os x server 10.5
apple mac os x 10.5.1
apple mac os x server 10.5.1
apple mac os x 10.5.2
vmware ace 2.0
apple mac os x server 10.5.2
novell open enterprise server *
vmware ace 1.0
vmware ace 1.0.3
vmware server 1.0.3
vmware workstation 5.5
vmware workstation 5.5.3
vmware workstation 5.5.4
novell opensuse 10.2
novell opensuse 10.3
vmware ace 2.0.3
vmware ace 2.0.1
vmware ace 2.0.2
vmware esx server 3.5
vmware server 1.0
vmware workstation 5.5.0
vmware workstation 5.5.2
vmware workstation 5.5.5
vmware workstation 5.5.6
vmware workstation 6.0.1
vmware workstation 6.0.2
vmware workstation 6.0.3
vmware ace 1.0.1
vmware ace 1.0.2
vmware ace 1.0.4
vmware ace 1.0.5
vmware server 1.0.1
vmware server 1.0.2
vmware server 1.0.4
vmware server 1.0.5
novell opensuse 11.0
novell suse linux enterprise server 10 sp2
apple mac os x server 10.5.3
apple mac os x 10.5.3
vmware esx server 3.0.3
vmware server 1.0.6
vmware workstation 5.5.7
vmware workstation 6.0.4
vmware ace 1.0.6
vmware ace 2.0.4
vmware virtualcenter 2.5