Vulnerability Name:

CVE-2010-1447 (CCN-23855)

Assigned:2010-05-17
Published:2010-05-17
Updated:2017-09-19
Summary:The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-4268

Source: MITRE
Type: CNA
CVE-2010-0624

Source: MITRE
Type: CNA
CVE-2010-1168

Source: MITRE
Type: CNA
CVE-2010-1321

Source: MITRE
Type: CNA
CVE-2010-1447

Source: MITRE
Type: CNA
CVE-2010-2063

Source: CONFIRM
Type: UNKNOWN
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

Source: CCN
Type: VMSA-2010-0013
VMware ESX third party updates for Service Console

Source: OSVDB
Type: UNKNOWN
64756

Source: CCN
Type: RHSA-2007-0245
Low: cpio security and bug fix update

Source: CCN
Type: RHSA-2010-0141
Moderate: tar security update

Source: CCN
Type: RHSA-2010-0142
Moderate: tar security update

Source: CCN
Type: RHSA-2010-0143
Moderate: cpio security update

Source: CCN
Type: RHSA-2010-0144
Moderate: cpio security update

Source: CCN
Type: RHSA-2010-0145
Moderate: cpio security update

Source: CCN
Type: RHSA-2010-0423
Important: krb5 security update

Source: CCN
Type: RHSA-2010-0457
Moderate: perl security update

Source: CCN
Type: RHSA-2010-0458
Moderate: perl security update

Source: CCN
Type: RHSA-2010-0488
Critical: samba and samba3x security update

Source: CCN
Type: RHSA-2010-0770
Critical: java-1.6.0-sun security update

Source: CCN
Type: RHSA-2010-0807
Critical: java-1.5.0-ibm security update

Source: CCN
Type: RHSA-2010-0873
Critical: java-1.5.0-ibm security update

Source: CCN
Type: RHSA-2010-0935
Moderate: java-1.4.2-ibm security update

Source: CCN
Type: RHSA-2010-0987
Critical: java-1.6.0-ibm security and bug fix update

Source: CCN
Type: RHSA-2011-0152
Moderate: java-1.4.2-ibm security update

Source: CCN
Type: RHSA-2011-0880
Low: Red Hat Network Satellite server IBM Java Runtime security update

Source: CCN
Type: SA18251
Cpio Large File Size Handling Denial of Service Vulnerability

Source: CCN
Type: SA38869
GNU Cpio "rmt" Buffer Overflow Vulnerability

Source: CCN
Type: SA39762
Kerberos GSS-API NULL Pointer Dereference Vulnerability

Source: CCN
Type: SA39845
PostgreSQL Two Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
39845

Source: SECUNIA
Type: UNKNOWN
40049

Source: SECUNIA
Type: UNKNOWN
40052

Source: CCN
Type: SA40145
Samba SMB1 Packet Chaining Memory Corruption Vulnerability

Source: CCN
Type: SA41196
VMware ESX Server Multiple Vulnerabilities

Source: CCN
Type: SA41262
VMware ESX Server Multiple Vulnerabilities

Source: CCN
Type: SA42280
VMware ESX / ESXi Server Update for Multiple Packages

Source: CCN
Type: SA42402
Oracle Solaris Perl Safe Module Security Bypass

Source: CCN
Type: SA42974
Oracle JRockit Multiple Vulnerabilities

Source: CCN
Type: SA43335
Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

Source: CCN
Type: SA47305
F5 Enterprise Manager Multiple Vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://security-tracker.debian.org/tracker/CVE-2010-1447

Source: CCN
Type: SECTRACK ID: 1023988
PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

Source: CCN
Type: SECTRACK ID: 1024062
Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

Source: CCN
Type: SECTRACK ID: 1024107
Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: ASA-2007-251
cpio security and bug fix update (RHSA-2007-0245)

Source: CCN
Type: F5 Networks Web site
Release Note: Enterprise Manager version 2.3.0

Source: DEBIAN
Type: UNKNOWN
DSA-2267

Source: DEBIAN
Type: DSA-2052
krb5 -- null pointer dereference

Source: DEBIAN
Type: DSA-2061
samba -- memory corruption

Source: DEBIAN
Type: DSA-2267
perl -- restriction bypass

Source: CCN
Type: GNU Project Web site
Cpio

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:115

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:116

Source: MLIST
Type: UNKNOWN
[oss-security] 20100520 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request

Source: CCN
Type: Oracle Critical Patch Update Advisory - July 2011
Oracle Critical Patch Update Advisory - July 2011

Source: CCN
Type: OSVDB ID: 22194
cpio on 64-bit Large File Size Handling Overflow

Source: CCN
Type: OSVDB ID: 62950
GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

Source: CCN
Type: OSVDB ID: 64744
MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

Source: CCN
Type: OSVDB ID: 64756
PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

Source: CCN
Type: OSVDB ID: 65518
Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

Source: CONFIRM
Type: UNKNOWN
http://www.postgresql.org/about/news.1203

Source: REDHAT
Type: UNKNOWN
RHSA-2010:0457

Source: REDHAT
Type: UNKNOWN
RHSA-2010:0458

Source: CCN
Type: BID-16057
CPIO File Size Stack Buffer Overflow Vulnerability

Source: CCN
Type: BID-40235
MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

Source: BID
Type: UNKNOWN
40305

Source: CCN
Type: BID-40305
Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

Source: CCN
Type: BID-40884
Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

Source: SECTRACK
Type: UNKNOWN
1023988

Source: CCN
Type: USN-234-1
cpio vulnerability

Source: VUPEN
Type: Patch, Vendor Advisory
ADV-2010-1167

Source: CONFIRM
Type: UNKNOWN
https://bugs.launchpad.net/bugs/cve/2010-1447

Source: CCN
Type: Red Hat Bugzilla Bug 172669
CVE-2005-4268 cpio large filesize buffer overflow

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=588269

Source: XF
Type: UNKNOWN
cpio-file-size-bo(23855)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11530

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:7320

Source: SUSE
Type: SUSE-SA:2010:025
Samba security update

Source: SUSE
Type: SUSE-SA:2011:006
IBM Java 6 security update

Source: SUSE
Type: SUSE-SA:2011:014
IBM Java security update

Source: SUSE
Type: SUSE-SR:2006:010
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:011
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:013
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:015
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:016
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:019
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2011:008
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.27:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4.28:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0.24:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:postgresql:postgresql:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.19:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1.20:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:postgresql:postgresql:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/a:postgresql:postgresql:9.0.0:beta1:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2010-1447 (CCN-56803)

    Assigned:2010-03-09
    Published:2010-03-09
    Updated:2010-03-09
    Summary:The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
    6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2005-4268

    Source: MITRE
    Type: CNA
    CVE-2010-0624

    Source: MITRE
    Type: CNA
    CVE-2010-1168

    Source: MITRE
    Type: CNA
    CVE-2010-1321

    Source: MITRE
    Type: CNA
    CVE-2010-1447

    Source: MITRE
    Type: CNA
    CVE-2010-2063

    Source: CCN
    Type: VMSA-2010-0013
    VMware ESX third party updates for Service Console

    Source: CCN
    Type: RHSA-2007-0245
    Low: cpio security and bug fix update

    Source: CCN
    Type: RHSA-2010-0141
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0142
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0143
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0144
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0145
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0423
    Important: krb5 security update

    Source: CCN
    Type: RHSA-2010-0457
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0458
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0488
    Critical: samba and samba3x security update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA18251
    Cpio Large File Size Handling Denial of Service Vulnerability

    Source: CCN
    Type: SA38836
    GNU Tar "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA38869
    GNU Cpio "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA39762
    Kerberos GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA39845
    PostgreSQL Two Vulnerabilities

    Source: CCN
    Type: SA40145
    Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA40511
    Sun Solaris GNU Tar and GNU Cpio Buffer Overflow Vulnerability

    Source: CCN
    Type: SA41196
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41262
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA42280
    VMware ESX / ESXi Server Update for Multiple Packages

    Source: CCN
    Type: SA42402
    Oracle Solaris Perl Safe Module Security Bypass

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: SA43335
    Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA47305
    F5 Enterprise Manager Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1023988
    PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

    Source: CCN
    Type: SECTRACK ID: 1024062
    Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

    Source: CCN
    Type: SECTRACK ID: 1024107
    Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: F5 Networks Web site
    Release Note: Enterprise Manager version 2.3.0

    Source: DEBIAN
    Type: DSA-2052
    krb5 -- null pointer dereference

    Source: DEBIAN
    Type: DSA-2061
    samba -- memory corruption

    Source: DEBIAN
    Type: DSA-2267
    perl -- restriction bypass

    Source: CCN
    Type: GNU cpio Web page
    Introduction to Cpio

    Source: CCN
    Type: GNU tar Web site
    Tar - GNU Project - Free Software Foundation (FSF)

    Source: CCN
    Type: IBM Security Bulletin T1025085 (Flex System Manager Node)
    IBM Flex System Manager (FSM) is affected by tar vulnerabilities (CVE-2010-0624 CVE-2016-6321)

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - July 2011
    Oracle Critical Patch Update Advisory - July 2011

    Source: CCN
    Type: OSVDB ID: 22194
    cpio on 64-bit Large File Size Handling Overflow

    Source: CCN
    Type: OSVDB ID: 62950
    GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

    Source: CCN
    Type: OSVDB ID: 64744
    MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

    Source: CCN
    Type: OSVDB ID: 64756
    PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

    Source: CCN
    Type: OSVDB ID: 65518
    Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

    Source: CCN
    Type: BID-16057
    CPIO File Size Stack Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-38628
    GNU Tar and GNU Cpio Remote Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-40235
    MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

    Source: CCN
    Type: BID-40305
    Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40884
    Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

    Source: XF
    Type: UNKNOWN
    tar-cpio-rmtread-bo(56803)

    Source: CCN
    Type: SUSE-SA:2010:025
    Samba security update

    Source: CCN
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: CCN
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: CCN
    Type: SUSE-SR:2010:011
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:013
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:015
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:016
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:tar:1.22:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:cpio:2.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:solaris:9.0:*:*:*:*:sparc:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/a:quest:intrust_knowledge_pack_for_sun_solaris:10.2.5.1024:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/h:ibm:flex_system_manager_node:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2010-1447 (CCN-58737)

    Assigned:2010-05-17
    Published:2010-05-17
    Updated:2010-05-17
    Summary:The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
    CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): Low
    User Interaction (UI): Required
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
    6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
    4.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2005-4268

    Source: MITRE
    Type: CNA
    CVE-2010-0624

    Source: MITRE
    Type: CNA
    CVE-2010-1168

    Source: MITRE
    Type: CNA
    CVE-2010-1321

    Source: MITRE
    Type: CNA
    CVE-2010-1447

    Source: MITRE
    Type: CNA
    CVE-2010-2063

    Source: CCN
    Type: VMSA-2010-0013
    VMware ESX third party updates for Service Console

    Source: CCN
    Type: oss-security Mailing List, 20 May 18:26
    CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request

    Source: CCN
    Type: RHSA-2007-0245
    Low: cpio security and bug fix update

    Source: CCN
    Type: RHSA-2010-0141
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0142
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0143
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0144
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0145
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0423
    Important: krb5 security update

    Source: CCN
    Type: RHSA-2010-0457
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0458
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0488
    Critical: samba and samba3x security update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA18251
    Cpio Large File Size Handling Denial of Service Vulnerability

    Source: CCN
    Type: SA38869
    GNU Cpio "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA39762
    Kerberos GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA39845
    PostgreSQL Two Vulnerabilities

    Source: CCN
    Type: SA40145
    Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA41196
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41262
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA42280
    VMware ESX / ESXi Server Update for Multiple Packages

    Source: CCN
    Type: SA42402
    Oracle Solaris Perl Safe Module Security Bypass

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: SA43309
    VMware Products Oracle (Sun) JRE Multiple Vulnerabilities

    Source: CCN
    Type: SA43335
    Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA47305
    F5 Enterprise Manager Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1023988
    PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

    Source: CCN
    Type: SECTRACK ID: 1024062
    Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

    Source: CCN
    Type: SECTRACK ID: 1024107
    Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: F5 Networks Web site
    Release Note: Enterprise Manager version 2.3.0

    Source: DEBIAN
    Type: DSA-2052
    krb5 -- null pointer dereference

    Source: DEBIAN
    Type: DSA-2061
    samba -- memory corruption

    Source: DEBIAN
    Type: DSA-2267
    perl -- restriction bypass

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - July 2011
    Oracle Critical Patch Update Advisory - July 2011

    Source: CCN
    Type: OSVDB ID: 22194
    cpio on 64-bit Large File Size Handling Overflow

    Source: CCN
    Type: OSVDB ID: 62950
    GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

    Source: CCN
    Type: OSVDB ID: 64744
    MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

    Source: CCN
    Type: OSVDB ID: 64756
    PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

    Source: CCN
    Type: OSVDB ID: 65518
    Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

    Source: CCN
    Type: PostgreSQL Web Site
    PostgreSQL Security Information

    Source: CCN
    Type: BID-16057
    CPIO File Size Stack Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-40235
    MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

    Source: CCN
    Type: BID-40302
    Perl Safe Module 'reval()' and 'rdo()' Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40305
    Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40884
    Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

    Source: CCN
    Type: Red Hat Bugzilla Bug 588269
    CVE-2010-1447 perl: Safe restriction bypass when reference to subroutine in compartment is called from outside

    Source: XF
    Type: UNKNOWN
    postgresql-plperl-code-execution(58737)

    Source: CCN
    Type: SUSE-SA:2010:025
    Samba security update

    Source: CCN
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: CCN
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: CCN
    Type: SUSE-SR:2010:011
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:013
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:015
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:016
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2010-1447 (CCN-58747)

    Assigned:2010-05-17
    Published:2010-05-17
    Updated:2010-05-18
    Summary:The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
    CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): Low
    User Interaction (UI): Required
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
    6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
    3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-2005-4268

    Source: MITRE
    Type: CNA
    CVE-2010-0624

    Source: MITRE
    Type: CNA
    CVE-2010-1168

    Source: MITRE
    Type: CNA
    CVE-2010-1321

    Source: MITRE
    Type: CNA
    CVE-2010-1447

    Source: MITRE
    Type: CNA
    CVE-2010-2063

    Source: CCN
    Type: VMSA-2010-0013
    VMware ESX third party updates for Service Console

    Source: CCN
    Type: RHSA-2007-0245
    Low: cpio security and bug fix update

    Source: CCN
    Type: RHSA-2010-0141
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0142
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0143
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0144
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0145
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0423
    Important: krb5 security update

    Source: CCN
    Type: RHSA-2010-0457
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0458
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0488
    Critical: samba and samba3x security update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA18251
    Cpio Large File Size Handling Denial of Service Vulnerability

    Source: CCN
    Type: SA38869
    GNU Cpio "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA39762
    Kerberos GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA39845
    PostgreSQL Two Vulnerabilities

    Source: CCN
    Type: SA39953
    Heimdal GSS-API and kdc NULL Pointer Dereferences Denial of Service

    Source: CCN
    Type: SA40145
    Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA40209
    Avaya Products krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA41196
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41262
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA42280
    VMware ESX / ESXi Server Update for Multiple Packages

    Source: CCN
    Type: SA42402
    Oracle Solaris Perl Safe Module Security Bypass

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: SA43335
    Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA47305
    F5 Enterprise Manager Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1023988
    PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

    Source: CCN
    Type: SECTRACK ID: 1024062
    Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

    Source: CCN
    Type: SECTRACK ID: 1024107
    Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: F5 Networks Web site
    Release Note: Enterprise Manager version 2.3.0

    Source: CCN
    Type: MITKRB5-SA-2010-005
    GSS-API library null pointer dereference

    Source: DEBIAN
    Type: DSA-2052
    krb5 -- null pointer dereference

    Source: DEBIAN
    Type: DSA-2061
    samba -- memory corruption

    Source: DEBIAN
    Type: DSA-2267
    perl -- restriction bypass

    Source: CCN
    Type: Heimdal Web site
    2010-05-27 - Tries to follow NULL pointers in KDC and GSS-API Kerberos acceptor (server)

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - July 2011
    Oracle Critical Patch Update Advisory - July 2011

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - October 2010
    Oracle Critical Patch Update Advisory - October 2010

    Source: CCN
    Type: Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010
    Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010

    Source: CCN
    Type: OSVDB ID: 22194
    cpio on 64-bit Large File Size Handling Overflow

    Source: CCN
    Type: OSVDB ID: 62950
    GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

    Source: CCN
    Type: OSVDB ID: 64744
    MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

    Source: CCN
    Type: OSVDB ID: 64756
    PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

    Source: CCN
    Type: OSVDB ID: 65518
    Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

    Source: CCN
    Type: BID-16057
    CPIO File Size Stack Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-40235
    MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

    Source: CCN
    Type: BID-40305
    Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40884
    Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

    Source: CCN
    Type: USN-940-1
    Kerberos vulnerabilities

    Source: XF
    Type: UNKNOWN
    kerberos-apreq-dos(58747)

    Source: CCN
    Type: ASA-2010-160
    Avaya Products krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SUSE-SA:2010:025
    Samba security update

    Source: CCN
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: CCN
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: CCN
    Type: SUSE-SR:2010:011
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:013
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:015
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:016
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:-:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos:5-1.8:alpha:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06:*:lts:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04:*:lts:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2010-1447 (CCN-59481)

    Assigned:2010-05-17
    Published:2010-05-17
    Updated:2010-06-16
    Summary:The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
    6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2005-4268

    Source: MITRE
    Type: CNA
    CVE-2010-0624

    Source: MITRE
    Type: CNA
    CVE-2010-1168

    Source: MITRE
    Type: CNA
    CVE-2010-1321

    Source: MITRE
    Type: CNA
    CVE-2010-1447

    Source: MITRE
    Type: CNA
    CVE-2010-2063

    Source: CCN
    Type: VMSA-2010-0013
    VMware ESX third party updates for Service Console

    Source: CCN
    Type: RHSA-2007-0245
    Low: cpio security and bug fix update

    Source: CCN
    Type: RHSA-2010-0141
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0142
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0143
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0144
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0145
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0423
    Important: krb5 security update

    Source: CCN
    Type: RHSA-2010-0457
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0458
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0488
    Critical: samba and samba3x security update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA18251
    Cpio Large File Size Handling Denial of Service Vulnerability

    Source: CCN
    Type: SA38869
    GNU Cpio "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA39762
    Kerberos GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA39845
    PostgreSQL Two Vulnerabilities

    Source: CCN
    Type: SA40145
    Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA41196
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41262
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41600
    Sun Solaris Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA41602
    Sun Solaris GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA42280
    VMware ESX / ESXi Server Update for Multiple Packages

    Source: CCN
    Type: SA42402
    Oracle Solaris Perl Safe Module Security Bypass

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: SA43335
    Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA43887
    Xerox WorkCentre Samba SMB1 Packet Chaining Vulnerability

    Source: CCN
    Type: SA47305
    F5 Enterprise Manager Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1023988
    PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

    Source: CCN
    Type: SECTRACK ID: 1024062
    Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

    Source: CCN
    Type: SECTRACK ID: 1024107
    Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: Apple Web site
    About Security Update 2010-005

    Source: CCN
    Type: F5 Networks Web site
    Release Note: Enterprise Manager version 2.3.0

    Source: DEBIAN
    Type: DSA-2052
    krb5 -- null pointer dereference

    Source: DEBIAN
    Type: DSA-2061
    samba -- memory corruption

    Source: DEBIAN
    Type: DSA-2267
    perl -- restriction bypass

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - July 2011
    Oracle Critical Patch Update Advisory - July 2011

    Source: CCN
    Type: OSVDB ID: 22194
    cpio on 64-bit Large File Size Handling Overflow

    Source: CCN
    Type: OSVDB ID: 62950
    GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

    Source: CCN
    Type: OSVDB ID: 64744
    MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

    Source: CCN
    Type: OSVDB ID: 64756
    PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

    Source: CCN
    Type: OSVDB ID: 65518
    Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

    Source: CCN
    Type: Samba Web site
    Samba 3.0.x to 3.3.12 are affected by a memory corruption vulnerability.

    Source: CCN
    Type: BID-16057
    CPIO File Size Stack Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-40235
    MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

    Source: CCN
    Type: BID-40305
    Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40884
    Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

    Source: CCN
    Type: XRX11-002
    Software Update to Address Buffer Overflow

    Source: XF
    Type: UNKNOWN
    samba-smb1-code-execution(59481)

    Source: CCN
    Type: iDefense Labs Public Advisory: 06.16.10
    Samba 3.3.12 Memory Corruption Vulnerability

    Source: CCN
    Type: SUSE-SA:2010:025
    Samba security update

    Source: CCN
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: CCN
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: CCN
    Type: SUSE-SR:2010:011
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:013
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:015
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:016
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: CCN
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.26a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.27a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.14a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.20a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.20b:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23b:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23c:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23d:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.21a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.21b:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.21c:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25b:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25c:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.27:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.28a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.29:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.31:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.32:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.30:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.34:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.28:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.10:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.37:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.36:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.35:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.11:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.12:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/h:xerox:workcentre_5755:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:42420
    P
    Security update for logrotate (Important)
    2022-07-25
    oval:org.opensuse.security:def:20101447
    V
    CVE-2010-1447
    2022-05-20
    oval:org.opensuse.security:def:42211
    P
    Security update for openssh (Important)
    2022-03-10
    oval:org.opensuse.security:def:32233
    P
    Security update for the Linux Kernel (Important)
    2021-12-06
    oval:org.opensuse.security:def:26162
    P
    Security update for pcre (Moderate)
    2021-11-10
    oval:org.opensuse.security:def:31697
    P
    Security update for opensc (Important)
    2021-10-29
    oval:org.opensuse.security:def:26156
    P
    Security update for open-lldp (Moderate)
    2021-10-26
    oval:org.opensuse.security:def:31283
    P
    Security update for apache2 (Important)
    2021-10-06
    oval:org.opensuse.security:def:26139
    P
    Security update for libvirt (Moderate)
    2021-10-04
    oval:org.opensuse.security:def:31272
    P
    Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP3) (Important)
    2021-09-23
    oval:org.opensuse.security:def:32194
    P
    Security update for xen (Important)
    2021-09-23
    oval:org.opensuse.security:def:31271
    P
    Security update for the Linux Kernel (Live Patch 36 for SLE 12 SP3) (Important)
    2021-09-23
    oval:org.opensuse.security:def:32185
    P
    Security update for ghostscript (Critical)
    2021-09-21
    oval:org.opensuse.security:def:26130
    P
    Security update for ghostscript (Critical)
    2021-09-21
    oval:org.opensuse.security:def:32976
    P
    Security update for cpio (Important)
    2021-08-14
    oval:org.opensuse.security:def:26099
    P
    Security update for libsndfile (Critical)
    2021-08-05
    oval:org.opensuse.security:def:26098
    P
    Security update for webkit2gtk3 (Important)
    2021-08-03
    oval:org.opensuse.security:def:32145
    P
    Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) (Important)
    2021-07-21
    oval:org.opensuse.security:def:26086
    P
    Security update for libsolv (Important)
    2021-06-28
    oval:org.opensuse.security:def:26072
    P
    Security update for caribou (Important)
    2021-06-10
    oval:org.opensuse.security:def:31638
    P
    Security update for caribou (Important)
    2021-06-10
    oval:org.opensuse.security:def:32937
    P
    Security update for MozillaFirefox (Important)
    2021-06-08
    oval:org.opensuse.security:def:36265
    P
    perl-32bit-5.10.0-64.72.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:42672
    P
    perl-32bit-5.10.0-64.72.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:36537
    P
    perl-base-32bit-5.10.0-64.72.1 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:32091
    P
    Security update for python3 (Important)
    2021-05-17
    oval:org.opensuse.security:def:32089
    P
    Security update for samba (Important)
    2021-05-04
    oval:org.opensuse.security:def:26033
    P
    Security update for ImageMagick (Moderate)
    2021-04-20
    oval:org.opensuse.security:def:31743
    P
    Security update for python (Moderate)
    2021-03-16
    oval:org.opensuse.security:def:31732
    P
    Security update for krb5-appl (Important)
    2021-02-19
    oval:org.opensuse.security:def:31731
    P
    Security update for java-1_7_1-ibm (Important)
    2021-02-18
    oval:org.opensuse.security:def:26192
    P
    Security update for php72 (Important)
    2021-02-17
    oval:org.opensuse.security:def:32255
    P
    Security update for the Linux Kernel (Important)
    2021-02-12
    oval:org.opensuse.security:def:31725
    P
    Security update for openvswitch (Important)
    2021-02-12
    oval:org.opensuse.security:def:26087
    P
    Security update for sudo (Important)
    2021-01-26
    oval:org.opensuse.security:def:31357
    P
    Security update for MozillaFirefox (Important)
    2021-01-12
    oval:org.opensuse.security:def:32098
    P
    Security update for dovecot22 (Important)
    2021-01-04
    oval:org.opensuse.security:def:25984
    P
    Security update for cyrus-sasl (Important)
    2020-12-28
    oval:org.opensuse.security:def:31565
    P
    Security update for openssl (Important)
    2020-12-11
    oval:org.opensuse.security:def:36013
    P
    perl-32bit-5.10.0-64.67.52 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:35804
    P
    perl-32bit-5.10.0-64.55.1 on GA media (Moderate)
    2020-12-03
    oval:org.opensuse.security:def:31480
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32446
    P
    Security update for xen (Important)
    2020-12-01
    oval:org.opensuse.security:def:32768
    P
    perl-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31479
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32397
    P
    Security update for unzip (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32729
    P
    librpcsecgss on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26018
    P
    Security update for freerdp (Important)
    2020-12-01
    oval:org.opensuse.security:def:32341
    P
    Security update for spice (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25890
    P
    Security update for php5 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32047
    P
    Security update for kvm (Important)
    2020-12-01
    oval:org.opensuse.security:def:25826
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:26804
    P
    perl-HTML-Parser on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25815
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:32041
    P
    Security update for krb5 (Important)
    2020-12-01
    oval:org.opensuse.security:def:26765
    P
    librsvg on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27011
    P
    perl-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25814
    P
    Security update for flash-player (Important)
    2020-12-01
    oval:org.opensuse.security:def:31949
    P
    Security update for grub2 (Important)
    2020-12-01
    oval:org.opensuse.security:def:26716
    P
    gvim on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26976
    P
    libtspi1 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31817
    P
    Security update for atftp (Important)
    2020-12-01
    oval:org.opensuse.security:def:26663
    P
    PolicyKit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26338
    P
    Security update for Chromium (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26512
    P
    Security update for pdns-recursor (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26294
    P
    Security update for bluez (Important)
    2020-12-01
    oval:org.opensuse.security:def:26428
    P
    Security update for redis (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26371
    P
    Security update for Chromium (Important)
    2020-12-01
    oval:org.opensuse.security:def:26290
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32299
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25931
    P
    Security update for libcares2 (Low)
    2020-12-01
    oval:org.opensuse.security:def:25780
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32025
    P
    Security update for kernel-source (Important)
    2020-12-01
    oval:org.opensuse.security:def:25696
    P
    Security update for sudo (Important)
    2020-12-01
    oval:org.opensuse.security:def:31986
    P
    Security update for java-1_7_1-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:27263
    P
    perl-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25639
    P
    Security update for libqt5-qtimageformats (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31937
    P
    Security update for glibc (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27228
    P
    libxcrypt on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25558
    P
    Security update for systemd (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31881
    P
    Security update for dnsmasq (Important)
    2020-12-01
    oval:org.opensuse.security:def:26590
    P
    libmusicbrainz4 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25430
    P
    Security update for java-1_7_1-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:26546
    P
    findutils on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25366
    P
    Security update for ghostscript (Important)
    2020-12-01
    oval:org.opensuse.security:def:26280
    P
    Security update for ImageMagick (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33228
    P
    perl-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25355
    P
    Security update for xen (Important)
    2020-12-01
    oval:org.opensuse.security:def:31581
    P
    Security update for tar (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26241
    P
    Security update for evolution (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33189
    P
    libupsclient1 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25354
    P
    Security update for mozilla-nspr, mozilla-nss (Important)
    2020-12-01
    oval:org.opensuse.security:def:31489
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32551
    P
    libexiv2-4 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32507
    P
    evolution-data-server on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25988
    P
    Security update for gd (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25904
    P
    Security update for gegl (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27535
    P
    perl-base-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25847
    P
    Security update for flash-player (Important)
    2020-12-01
    oval:org.opensuse.security:def:27500
    P
    libwebkit-1_0-2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25766
    P
    Security update for mariadb (Important)
    2020-12-01
    oval:org.opensuse.security:def:26862
    P
    apache2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25638
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:31933
    P
    Security update for glibc (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26818
    P
    rsyslog on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25574
    P
    Security update for MozillaFirefox (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31846
    P
    Security update for clamav (Important)
    2020-12-01
    oval:org.opensuse.security:def:26532
    P
    cron on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25563
    P
    Security update for xrdp (Important)
    2020-12-01
    oval:org.opensuse.security:def:31789
    P
    Security update for MozillaFirefox (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26493
    P
    Security update for phpMyAdmin (Important)
    2020-12-01
    oval:org.opensuse.security:def:26803
    P
    perl-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25562
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:26444
    P
    Security update for mumble (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26768
    P
    libsnmp15-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26391
    P
    Security update for MozillaThunderbird (Important)
    2020-12-01
    oval:org.opensuse.security:def:31491
    P
    Security update for Python
    2020-12-01
    oval:org.opensuse.security:def:26240
    P
    Security update for gd (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:32485
    P
    PolicyKit on GA media (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:13932
    P
    USN-1129-1 -- perl vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13030
    P
    DSA-2267-1 perl -- restriction bypass
    2014-06-23
    oval:org.mitre.oval:def:22753
    P
    ELSA-2010:0458: perl security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:22359
    P
    RHSA-2010:0458: perl security update (Moderate)
    2014-02-24
    oval:org.mitre.oval:def:7320
    V
    VMware ESX,Service Console update for perl.
    2014-01-20
    oval:org.mitre.oval:def:11530
    V
    The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
    2013-04-29
    oval:com.redhat.rhsa:def:20100457
    P
    RHSA-2010:0457: perl security update (Moderate)
    2010-06-07
    oval:com.redhat.rhsa:def:20100458
    P
    RHSA-2010:0458: perl security update (Moderate)
    2010-06-07
    BACK
    postgresql postgresql 7.4
    postgresql postgresql 7.4.1
    postgresql postgresql 7.4.2
    postgresql postgresql 7.4.3
    postgresql postgresql 7.4.4
    postgresql postgresql 7.4.5
    postgresql postgresql 7.4.6
    postgresql postgresql 7.4.7
    postgresql postgresql 7.4.8
    postgresql postgresql 7.4.9
    postgresql postgresql 7.4.10
    postgresql postgresql 7.4.11
    postgresql postgresql 7.4.12
    postgresql postgresql 7.4.13
    postgresql postgresql 7.4.14
    postgresql postgresql 7.4.15
    postgresql postgresql 7.4.16
    postgresql postgresql 7.4.17
    postgresql postgresql 7.4.18
    postgresql postgresql 7.4.19
    postgresql postgresql 7.4.20
    postgresql postgresql 7.4.21
    postgresql postgresql 7.4.22
    postgresql postgresql 7.4.23
    postgresql postgresql 7.4.24
    postgresql postgresql 7.4.25
    postgresql postgresql 7.4.26
    postgresql postgresql 7.4.27
    postgresql postgresql 7.4.28
    postgresql postgresql 8.0
    postgresql postgresql 8.0.0
    postgresql postgresql 8.0.1
    postgresql postgresql 8.0.2
    postgresql postgresql 8.0.3
    postgresql postgresql 8.0.4
    postgresql postgresql 8.0.5
    postgresql postgresql 8.0.6
    postgresql postgresql 8.0.7
    postgresql postgresql 8.0.8
    postgresql postgresql 8.0.9
    postgresql postgresql 8.0.10
    postgresql postgresql 8.0.11
    postgresql postgresql 8.0.12
    postgresql postgresql 8.0.13
    postgresql postgresql 8.0.14
    postgresql postgresql 8.0.15
    postgresql postgresql 8.0.16
    postgresql postgresql 8.0.17
    postgresql postgresql 8.0.18
    postgresql postgresql 8.0.19
    postgresql postgresql 8.0.20
    postgresql postgresql 8.0.21
    postgresql postgresql 8.0.22
    postgresql postgresql 8.0.23
    postgresql postgresql 8.0.24
    postgresql postgresql 8.1
    postgresql postgresql 8.1.0
    postgresql postgresql 8.1.1
    postgresql postgresql 8.1.2
    postgresql postgresql 8.1.3
    postgresql postgresql 8.1.4
    postgresql postgresql 8.1.5
    postgresql postgresql 8.1.6
    postgresql postgresql 8.1.7
    postgresql postgresql 8.1.8
    postgresql postgresql 8.1.9
    postgresql postgresql 8.1.10
    postgresql postgresql 8.1.11
    postgresql postgresql 8.1.12
    postgresql postgresql 8.1.13
    postgresql postgresql 8.1.14
    postgresql postgresql 8.1.15
    postgresql postgresql 8.1.16
    postgresql postgresql 8.1.17
    postgresql postgresql 8.1.18
    postgresql postgresql 8.1.19
    postgresql postgresql 8.1.20
    postgresql postgresql 8.2
    postgresql postgresql 8.2.1
    postgresql postgresql 8.2.2
    postgresql postgresql 8.2.3
    postgresql postgresql 8.2.4
    postgresql postgresql 8.2.5
    postgresql postgresql 8.2.6
    postgresql postgresql 8.2.7
    postgresql postgresql 8.2.8
    postgresql postgresql 8.2.9
    postgresql postgresql 8.2.10
    postgresql postgresql 8.2.11
    postgresql postgresql 8.2.12
    postgresql postgresql 8.2.13
    postgresql postgresql 8.2.14
    postgresql postgresql 8.2.15
    postgresql postgresql 8.2.16
    postgresql postgresql 8.3
    postgresql postgresql 8.3.1
    postgresql postgresql 8.3.2
    postgresql postgresql 8.3.3
    postgresql postgresql 8.3.4
    postgresql postgresql 8.3.5
    postgresql postgresql 8.3.6
    postgresql postgresql 8.3.7
    postgresql postgresql 8.3.8
    postgresql postgresql 8.3.9
    postgresql postgresql 8.3.10
    postgresql postgresql 8.4
    postgresql postgresql 8.4.1
    postgresql postgresql 8.4.2
    postgresql postgresql 8.4.3
    postgresql postgresql 9.0.0 beta1
    gnu tar 1.22
    gnu cpio 2.10
    sun solaris 9.0
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    quest intrust knowledge pack for sun solaris 10.2.5.1024
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    redhat rhel extras 4
    novell suse linux enterprise server 10
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    vmware esx server 3.0.0
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    novell open enterprise server *
    novell opensuse 11.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    vmware esx server 4.0
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    redhat enterprise linux 6
    f5 enterprise manager 2.0
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node supplementary 6.0
    ibm flex system manager node *
    larry_wall perl 5.8.0
    larry_wall perl 5.8.3
    larry_wall perl 5.9.2
    larry_wall perl 5.8.6
    postgresql postgresql 8.0
    postgresql postgresql 8.1
    postgresql postgresql 8.2
    postgresql postgresql 7.4
    larry_wall perl 5.8.1
    larry_wall perl 5.8.8
    postgresql postgresql 8.3
    postgresql postgresql 8.4
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    redhat rhel extras 4
    novell suse linux enterprise server 10
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    vmware esx server 3.0.0
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    novell open enterprise server *
    novell opensuse 11.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    vmware esx server 4.0
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    redhat enterprise linux 6
    f5 enterprise manager 2.0
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node supplementary 6.0
    oracle database server *
    mit kerberos 5-1.1
    mit kerberos 5-1.3
    mit kerberos 5-1.5
    mit kerberos 5-1.2.2
    mit kerberos 5-1.6.3
    mit kerberos 5
    mit kerberos 5-1.2
    mit kerberos 5-1.2.1
    mit kerberos 5-1.2.3
    mit kerberos 5-1.2.4
    mit kerberos 5-1.2.5
    mit kerberos 5-1.2.6
    mit kerberos 5-1.2.7
    mit kerberos 5-1.2.8
    mit kerberos 5-1.3.1
    mit kerberos 5-1.3.2
    mit kerberos 5-1.3.3
    mit kerberos 5-1.3.4
    mit kerberos 5-1.3.5
    mit kerberos 5-1.3.6
    mit kerberos 5-1.4
    mit kerberos 5-1.4.1
    mit kerberos 5-1.4.2
    mit kerberos 5-1.4.3
    mit kerberos 5-1.4.4
    mit kerberos 5-1.5.1
    mit kerberos 5-1.5.2
    mit kerberos 5-1.5.3
    mit kerberos 5-1.6
    mit kerberos 5-1.6.1
    mit kerberos 5-1.6.2
    mit kerberos 5-1.3 alpha1
    mit kerberos 5_1.0
    mit kerberos 5_1.0.6
    mit kerberos 5_1.1
    mit kerberos 5_1.1.1
    mit kerberos 5_1.2 beta1
    mit kerberos 5_1.2 beta2
    mit kerberos 5_1.3.3
    mit kerberos 5-1.7
    mit kerberos 5-1.7.1
    mit kerberos 5-1.8
    mit kerberos 5-1.8.1
    mit kerberos 5-1.8 alpha
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    redhat rhel extras 4
    canonical ubuntu 6.06
    novell suse linux enterprise server 10
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    vmware esx server 3.0.0
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    avaya communication manager 5.0
    novell open enterprise server *
    canonical ubuntu 8.04
    novell opensuse 11.0
    avaya communication manager 5.1
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    vmware esx server 4.0
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    redhat enterprise linux 6
    f5 enterprise manager 2.0
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node supplementary 6.0
    samba samba 3.0.0
    samba samba 3.0.1
    samba samba 3.0.2
    samba samba 3.0.6
    samba samba 3.0.4
    samba samba 3.0.7
    samba samba 3.0.10
    samba samba 3.0.26a
    samba samba 3.0.27a
    samba samba 3.0.2a
    samba samba 3.0.3
    samba samba 3.0.0
    samba samba 3.0.5
    samba samba 3.0.11
    samba samba 3.0.12
    samba samba 3.0.14
    samba samba 3.0.14a
    samba samba 3.0.15
    samba samba 3.0.16
    samba samba 3.0.17
    samba samba 3.0.18
    samba samba 3.0.19
    samba samba 3.0.20
    samba samba 3.0.20a
    samba samba 3.0.20b
    samba samba 3.0.21
    samba samba 3.0.22
    samba samba 3.0.23
    samba samba 3.0.23a
    samba samba 3.0.23b
    samba samba 3.0.23c
    samba samba 3.0.23d
    samba samba 3.0.24
    samba samba 3.0.21a
    samba samba 3.0.21b
    samba samba 3.0.21c
    samba samba 3.0.13
    samba samba 3.0.26
    samba samba 3.0.25
    samba samba 3.0.25a
    samba samba 3.0.25b
    samba samba 3.0.25c
    samba samba 3.0.8
    samba samba 3.0.9
    samba samba 3.0.25 pre1
    samba samba 3.0.25 pre2
    samba samba 3.0.25 rc1
    samba samba 3.0.25 rc2
    samba samba 3.0.25 rc3
    samba samba 3.0.27
    samba samba 3.0.4 rc1
    samba samba 3.0.28a
    samba samba 3.0.29
    samba samba 3.2.0
    samba samba 3.2.2
    samba samba 3.2.3
    samba samba 3.2.4
    samba samba 3.0.31
    samba samba 3.0.32
    samba samba 3.0.33
    samba samba 3.2.5
    samba samba 3.2.6
    samba samba 3.0.30
    samba samba 3.2.1
    samba samba 3.2.12
    samba samba 3.3.5
    samba samba 3.0.34
    samba samba 3.0.28
    samba samba 3.3.0
    samba samba 3.3.10
    samba samba 3.3.9
    samba samba 3.3.8
    samba samba 3.3.7
    samba samba 3.3.6
    samba samba 3.3.4
    samba samba 3.3.3
    samba samba 3.3.2
    samba samba 3.3.1
    samba samba 3.2.15
    samba samba 3.2.14
    samba samba 3.2.13
    samba samba 3.2.11
    samba samba 3.2.10
    samba samba 3.2.9
    samba samba 3.2.8
    samba samba 3.2.7
    samba samba 3.0.37
    samba samba 3.0.36
    samba samba 3.0.35
    samba samba 3.3.11
    samba samba 3.3.12
    samba samba 3.1.0
    samba samba 3.2
    samba samba 3.3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    redhat rhel extras 4
    novell suse linux enterprise server 10
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    vmware esx server 3.0.0
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    novell open enterprise server *
    novell opensuse 11.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    apple mac os x 10.5.8
    apple mac os x server 10.5.8
    vmware esx server 4.0
    apple mac os x server 10.6.4
    apple mac os x 10.6.4
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    xerox workcentre 5755 -
    redhat enterprise linux 6
    f5 enterprise manager 2.0
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node supplementary 6.0