ID

VAR-200411-0173


CVE

CVE-2004-0081


TITLE

OpenSSL does not properly handle unknown message types

Trust: 0.8

sources: CERT/CC: VU#465542

DESCRIPTION

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. This vulnerability was addressed in OpenSSL 0.9.6d and 0.9.7. The vulnerability is OpenSSL Applications and systems that use the library may also be affected. For more detailed information about other systems NISCC-224012 (JVN) , NISCC Advisory 224012 (CPNI Advisory 00389) Please check also.OpenSSL An application that uses the service disrupts service operation (DoS) It may be in a state. For the first issue, a NULL-pointer assignment can be triggered by attackers during SSL/TLS handshake exchanges. The CVE candidate name for this vulnerability is CAN-2004-0079. Versions 0.9.6c to 0.9.6k (inclusive) and from 0.9.7a to 0.9.7c (inclusive) are vulnerable. The second issue is also exploited during the SSL/TLS handshake, but only when Kerberos ciphersuites are in use. The vendor has reported that this vulnerability may not be a threat to many, because it occurs only when Kerberos ciphersuites are in use, an uncommon configuration. The CVE candidate name for this vulnerability is CAN-2004-0112. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected. This entry will be retired when individual BID records are created for each issue. *Note: A third denial-of-service vulnerability included in the announcement was discovered affecting 0.9.6 and fixed in 0.9.6d. The CVE candidate name for this vulnerability is CAN-2004-0081. Oracle Database Server, Oracle Application Server, Oracle Collaboration Suite, Oracle E-Business and Applications, Oracle Enterprise Manager Grid Control, and Oracle PeopleSoft Applications are reported prone to multiple vulnerabilities. Oracle has released a Critical Patch Update to address these issues in various supported applications and platforms. The issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. While various levels of authorization are required to leverage some issues, others do not require any authorization. This BID will be divided and updated into separate BIDs when more information is available. An attacker could exploit these vulnerabilities to take complete control of an affected database. TITLE: Fedora update for openssl096b SECUNIA ADVISORY ID: SA17381 VERIFY ADVISORY: http://secunia.com/advisories/17381/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for openssl096b. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA10133 SA11139 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 8d68e4b430aa7c5ca067c12866ae694e SRPMS/openssl096b-0.9.6b-21.42.src.rpm 54a9e78a2fdd625b9dc9121e09eb4398 x86_64/openssl096b-0.9.6b-21.42.x86_64.rpm c5c6174e23eba8d038889d08f49231b8 x86_64/debug/openssl096b-debuginfo-0.9.6b-21.42.x86_64.rpm 56b63fc150d0c099b2e4f0950e21005b x86_64/openssl096b-0.9.6b-21.42.i386.rpm 56b63fc150d0c099b2e4f0950e21005b i386/openssl096b-0.9.6b-21.42.i386.rpm 93195495585c7e9789041c75b1ed5380 i386/debug/openssl096b-debuginfo-0.9.6b-21.42.i386.rpm OTHER REFERENCES: SA10133: http://secunia.com/advisories/10133/ SA11139: http://secunia.com/advisories/11139/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.15

sources: NVD: CVE-2004-0081 // CERT/CC: VU#465542 // JVNDB: JVNDB-2004-000087 // BID: 9899 // BID: 13139 // VULHUB: VHN-8511 // PACKETSTORM: 41200 // PACKETSTORM: 41105

AFFECTED PRODUCTS

vendor:sgimodel:propackscope:eqversion:2.4

Trust: 2.1

vendor:sgimodel:propackscope:eqversion:2.3

Trust: 2.1

vendor:avayamodel:sg5scope:eqversion:4.4

Trust: 1.9

vendor:avayamodel:sg5scope:eqversion:4.3

Trust: 1.9

vendor:avayamodel:sg5scope:eqversion:4.2

Trust: 1.9

vendor:avayamodel:sg208scope:eqversion:4.4

Trust: 1.9

vendor:avayamodel:sg203scope:eqversion:4.31.29

Trust: 1.9

vendor:avayamodel:sg203scope:eqversion:4.4

Trust: 1.9

vendor:opensslmodel:opensslscope:eqversion:0.9.6c

Trust: 1.8

vendor:vmwaremodel:gsx serverscope:eqversion:2.5.1

Trust: 1.3

vendor:vmwaremodel:gsx serverscope:eqversion:2.0

Trust: 1.3

vendor:stonesoftmodel:stonegate vpn clientscope:eqversion:2.0.9

Trust: 1.3

vendor:stonesoftmodel:stonegate vpn clientscope:eqversion:2.0.8

Trust: 1.3

vendor:stonesoftmodel:stonegate vpn clientscope:eqversion:2.0.7

Trust: 1.3

vendor:stonesoftmodel:stonegate vpn clientscope:eqversion:2.0

Trust: 1.3

vendor:stonesoftmodel:stonegate vpn clientscope:eqversion:1.7.2

Trust: 1.3

vendor:stonesoftmodel:stonegate vpn clientscope:eqversion:1.7

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.2.4

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.2.1

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.2

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.1

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.9

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.8

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.7

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.6

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.5

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.4

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:2.0.1

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.7.2

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.7.1

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.7

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.6.3

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.6.2

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.5.18

Trust: 1.3

vendor:stonesoftmodel:stonegatescope:eqversion:1.5.17

Trust: 1.3

vendor:stonesoftmodel:stonebeat webclusterscope:eqversion:2.5

Trust: 1.3

vendor:stonesoftmodel:stonebeat webclusterscope:eqversion:2.0

Trust: 1.3

vendor:stonesoftmodel:stonebeat securityclusterscope:eqversion:2.5

Trust: 1.3

vendor:stonesoftmodel:stonebeat securityclusterscope:eqversion:2.0

Trust: 1.3

vendor:stonesoftmodel:serverclusterscope:eqversion:2.5.2

Trust: 1.3

vendor:stonesoftmodel:serverclusterscope:eqversion:2.5

Trust: 1.3

vendor:sgimodel:propackscope:eqversion:3.0

Trust: 1.3

vendor:redhatmodel:linuxscope:eqversion:8.0

Trust: 1.3

vendor:redhatmodel:linuxscope:eqversion:7.3

Trust: 1.3

vendor:redhatmodel:linuxscope:eqversion:7.2

Trust: 1.3

vendor:openbsdmodel:openbsdscope:eqversion:3.4

Trust: 1.3

vendor:openbsdmodel:openbsdscope:eqversion:3.3

Trust: 1.3

vendor:novellmodel:imanagerscope:eqversion:2.0

Trust: 1.3

vendor:novellmodel:imanagerscope:eqversion:1.5

Trust: 1.3

vendor:novellmodel:edirectoryscope:eqversion:8.7.1

Trust: 1.3

vendor:novellmodel:edirectoryscope:eqversion:8.7

Trust: 1.3

vendor:novellmodel:edirectoryscope:eqversion:8.6.2

Trust: 1.3

vendor:novellmodel:edirectoryscope:eqversion:8.5.27

Trust: 1.3

vendor:novellmodel:edirectoryscope:eqversion:8.5

Trust: 1.3

vendor:novellmodel:edirectoryscope:eqversion:8.0

Trust: 1.3

vendor:hpmodel:hp-uxscope:eqversion:11.23

Trust: 1.3

vendor:hpmodel:hp-uxscope:eqversion:11.11

Trust: 1.3

vendor:hpmodel:apache-based web serverscope:eqversion:2.0.43.04

Trust: 1.3

vendor:hpmodel:apache-based web serverscope:eqversion:2.0.43.00

Trust: 1.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 1.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 1.3

vendor:freebsdmodel:freebsdscope:eqversion:4.9

Trust: 1.3

vendor:freebsdmodel:freebsdscope:eqversion:4.8

Trust: 1.3

vendor:ciscomodel:webnsscope:eqversion:7.10

Trust: 1.3

vendor:ciscomodel:webnsscope:eqversion:6.10

Trust: 1.3

vendor:ciscomodel:secure content acceleratorscope:eqversion:10000

Trust: 1.3

vendor:ciscomodel:okena stormwatchscope:eqversion:3.2

Trust: 1.3

vendor:ciscomodel:firewall services modulescope:eqversion:1.1.3

Trust: 1.3

vendor:ciscomodel:firewall services modulescope:eqversion:1.1.2

Trust: 1.3

vendor:ciscomodel:css secure content acceleratorscope:eqversion:2.0

Trust: 1.3

vendor:ciscomodel:css secure content acceleratorscope:eqversion:1.0

Trust: 1.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 1.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.1

Trust: 1.3

vendor:avayamodel:sg200scope:eqversion:4.31.29

Trust: 1.3

vendor:avayamodel:sg200scope:eqversion:4.4

Trust: 1.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 1.3

vendor:4dmodel:webstarscope:eqversion:5.3.1

Trust: 1.3

vendor:4dmodel:webstarscope:eqversion:5.3

Trust: 1.3

vendor:4dmodel:webstarscope:eqversion:5.2.4

Trust: 1.3

vendor:4dmodel:webstarscope:eqversion:5.2.3

Trust: 1.3

vendor:4dmodel:webstarscope:eqversion:5.2.2

Trust: 1.3

vendor:4dmodel:webstarscope:eqversion:5.2.1

Trust: 1.3

vendor:4dmodel:webstarscope:eqversion:5.2

Trust: 1.3

vendor:4dmodel:webstarscope:eqversion:4.0

Trust: 1.3

vendor:opensslmodel:opensslscope:eqversion:0.9.6i

Trust: 1.0

vendor:ciscomodel:access registrarscope:eqversion:*

Trust: 1.0

vendor:stonesoftmodel:stonebeat fullclusterscope:eqversion:1_2.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:3.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6f

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(3.100\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(3.102\)

Trust: 1.0

vendor:neoterismodel:instant virtual extranetscope:eqversion:3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.2_rc1

Trust: 1.0

vendor:neoterismodel:instant virtual extranetscope:eqversion:3.3

Trust: 1.0

vendor:bluecoatmodel:cacheos ca sascope:eqversion:4.1.10

Trust: 1.0

vendor:dellmodel:bsafe ssl-jscope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:gss 4490 global site selectorscope:eqversion:*

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.2.2

Trust: 1.0

vendor:scomodel:openserverscope:eqversion:5.0.6

Trust: 1.0

vendor:avayamodel:intuity audixscope:eqversion:s3210

Trust: 1.0

vendor:ciscomodel:call managerscope:eqversion:*

Trust: 1.0

vendor:hpmodel:wbemscope:eqversion:a.02.00.01

Trust: 1.0

vendor:ciscomodel:threat responsescope:eqversion:*

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6h

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(11b\)e

Trust: 1.0

vendor:ciscomodel:application and content networking softwarescope:eqversion:*

Trust: 1.0

vendor:vmwaremodel:gsx serverscope:eqversion:2.0.1_build_2129

Trust: 1.0

vendor:securecomputingmodel:sidewinderscope:eqversion:5.2.0.02

Trust: 1.0

vendor:freebsdmodel:freebsdscope:eqversion:5.2.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.3_rc3

Trust: 1.0

vendor:ciscomodel:gss 4480 global site selectorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:eqversion:1.1_\(3.005\)

Trust: 1.0

vendor:novellmodel:edirectoryscope:eqversion:8.5.12a

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(4.101\)

Trust: 1.0

vendor:bluecoatmodel:proxysgscope:eqversion:*

Trust: 1.0

vendor:checkpointmodel:firewall-1scope:eqversion:2.0

Trust: 1.0

vendor:dellmodel:bsafe ssl-jscope:eqversion:3.0.1

Trust: 1.0

vendor:dellmodel:bsafe ssl-jscope:eqversion:3.0

Trust: 1.0

vendor:hpmodel:hp-uxscope:eqversion:8.05

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(11\)e

Trust: 1.0

vendor:avayamodel:s8700scope:eqversion:r2.0.1

Trust: 1.0

vendor:avayamodel:vsuscope:eqversion:10000_r2.0.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(19\)e1

Trust: 1.0

vendor:checkpointmodel:provider-1scope:eqversion:4.1

Trust: 1.0

vendor:vmwaremodel:gsx serverscope:eqversion:3.0_build_7592

Trust: 1.0

vendor:securecomputingmodel:sidewinderscope:eqversion:5.2.0.03

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(1\)

Trust: 1.0

vendor:scomodel:openserverscope:eqversion:5.0.7

Trust: 1.0

vendor:vmwaremodel:gsx serverscope:eqversion:2.5.1_build_5336

Trust: 1.0

vendor:avayamodel:vsuscope:eqversion:5

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(13\)e9

Trust: 1.0

vendor:ciscomodel:webnsscope:eqversion:7.10_.0.06s

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.3.1

Trust: 1.0

vendor:neoterismodel:instant virtual extranetscope:eqversion:3.3.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1

Trust: 1.0

vendor:ciscomodel:content services switch 11500scope:eqversion:*

Trust: 1.0

vendor:checkpointmodel:vpn-1scope:eqversion:next_generation_fp0

Trust: 1.0

vendor:checkpointmodel:vpn-1scope:eqversion:next_generation

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(3.109\)

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6g

Trust: 1.0

vendor:ciscomodel:mds 9000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3

Trust: 1.0

vendor:avayamodel:vsuscope:eqversion:7500_r2.0.1

Trust: 1.0

vendor:redhatmodel:opensslscope:eqversion:0.9.6-15

Trust: 1.0

vendor:ciscomodel:webnsscope:eqversion:7.2_0.0.03

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(1\)

Trust: 1.0

vendor:hpmodel:hp-uxscope:eqversion:11.00

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.2_rc2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(2\)

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.0.3

Trust: 1.0

vendor:tarantellamodel:enterprisescope:eqversion:3.20

Trust: 1.0

vendor:checkpointmodel:firewall-1scope:eqversion:next_generation_fp0

Trust: 1.0

vendor:hpmodel:aaa serverscope:eqversion:*

Trust: 1.0

vendor:avayamodel:s8500scope:eqversion:r2.0.1

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.3

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.3

Trust: 1.0

vendor:avayamodel:vsuscope:eqversion:500

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:10.3.3

Trust: 1.0

vendor:hpmodel:wbemscope:eqversion:a.01.05.08

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7c

Trust: 1.0

vendor:stonesoftmodel:stonebeat fullclusterscope:eqversion:2.0

Trust: 1.0

vendor:ciscomodel:css11000 content services switchscope:eqversion:*

Trust: 1.0

vendor:securecomputingmodel:sidewinderscope:eqversion:5.2.0.04

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6j

Trust: 1.0

vendor:avayamodel:sg208scope:eqversion:*

Trust: 1.0

vendor:neoterismodel:instant virtual extranetscope:eqversion:3.2

Trust: 1.0

vendor:stonesoftmodel:stonebeat fullclusterscope:eqversion:1_3.0

Trust: 1.0

vendor:sunmodel:crypto accelerator 4000scope:eqversion:1.0

Trust: 1.0

vendor:avayamodel:s8300scope:eqversion:r2.0.1

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7

Trust: 1.0

vendor:redhatmodel:opensslscope:eqversion:0.9.6b-3

Trust: 1.0

vendor:avayamodel:intuity audixscope:eqversion:*

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.0.2

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7a

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(4\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(3\)

Trust: 1.0

vendor:stonesoftmodel:stonebeat fullclusterscope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(2\)

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.1.1

Trust: 1.0

vendor:avayamodel:s8700scope:eqversion:r2.0.0

Trust: 1.0

vendor:tarantellamodel:enterprisescope:eqversion:3.30

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(11b\)e14

Trust: 1.0

vendor:securecomputingmodel:sidewinderscope:eqversion:5.2.0.01

Trust: 1.0

vendor:checkpointmodel:vpn-1scope:eqversion:next_generation_fp1

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.3_rc1

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.1

Trust: 1.0

vendor:symantecmodel:clientless vpn gateway 4400scope:eqversion:5.0

Trust: 1.0

vendor:checkpointmodel:vpn-1scope:eqversion:vsx_ng_with_application_intelligence

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(2\)

Trust: 1.0

vendor:securecomputingmodel:sidewinderscope:eqversion:5.2.1.02

Trust: 1.0

vendor:bluecoatmodel:cacheos ca sascope:eqversion:4.1.12

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.2.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(14\)sy

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(2\)

Trust: 1.0

vendor:checkpointmodel:firewall-1scope:eqversion:next_generation_fp1

Trust: 1.0

vendor:tarantellamodel:enterprisescope:eqversion:3.40

Trust: 1.0

vendor:ciscomodel:webnsscope:eqversion:6.10_b4

Trust: 1.0

vendor:hpmodel:wbemscope:eqversion:a.02.00.00

Trust: 1.0

vendor:avayamodel:vsuscope:eqversion:100_r2.0.1

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:eqversion:*

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7b

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2

Trust: 1.0

vendor:securecomputingmodel:sidewinderscope:eqversion:5.2.1

Trust: 1.0

vendor:avayamodel:intuity audixscope:eqversion:5.1.46

Trust: 1.0

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2_.111

Trust: 1.0

vendor:avayamodel:intuity audixscope:eqversion:s3400

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(1\)

Trust: 1.0

vendor:avayamodel:s8500scope:eqversion:r2.0.0

Trust: 1.0

vendor:checkpointmodel:firewall-1scope:eqversion:next_generation_fp2

Trust: 1.0

vendor:stonesoftmodel:stonebeat fullclusterscope:eqversion:2.5

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6d

Trust: 1.0

vendor:securecomputingmodel:sidewinderscope:eqversion:5.2

Trust: 1.0

vendor:ciscomodel:webnsscope:eqversion:7.1_0.2.06

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2\(14\)sy1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2sy

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(3\)

Trust: 1.0

vendor:avayamodel:vsuscope:eqversion:5x

Trust: 1.0

vendor:avayamodel:s8300scope:eqversion:r2.0.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(1\)

Trust: 1.0

vendor:redhatmodel:opensslscope:eqversion:0.9.7a-2

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:eqversion:2.1_\(0.208\)

Trust: 1.0

vendor:litemodel:speed technologies litespeed web serverscope:eqversion:1.3_rc2

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6k

Trust: 1.0

vendor:checkpointmodel:firewall-1scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2za

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(5\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(4\)

Trust: 1.0

vendor:avayamodel:vsuscope:eqversion:2000_r2.0.1

Trust: 1.0

vendor:avayamodel:vsuscope:eqversion:5000_r2.0.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(3\)

Trust: 1.0

vendor:neoterismodel:instant virtual extranetscope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.1\(11b\)e12

Trust: 1.0

vendor:ciscomodel:webnsscope:eqversion:7.1_0.1.02

Trust: 1.0

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:debianmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:guardian digitalmodel: - scope: - version: -

Trust: 0.8

vendor:netscreenmodel: - scope: - version: -

Trust: 0.8

vendor:opensslmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion:0.9.6

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion:0.9.6a

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion:0.9.6b

Trust: 0.8

vendor:vine linuxmodel:vine linuxscope:eqversion:2.5

Trust: 0.8

vendor:vine linuxmodel:vine linuxscope:eqversion:2.6

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:sun microsystemsmodel:crypto acceleratorscope:eqversion:1000 v1.0

Trust: 0.8

vendor:sun microsystemsmodel:crypto acceleratorscope:eqversion:1000 v1.1

Trust: 0.8

vendor:sun microsystemsmodel:crypto acceleratorscope:eqversion:4000 v1.0

Trust: 0.8

vendor:sun microsystemsmodel:crypto acceleratorscope:eqversion:500

Trust: 0.8

vendor:junipermodel:netscreen idpscope:eqversion:2.0 - 2.1r6

Trust: 0.8

vendor:junipermodel:netscreen ivescope:eqversion: -

Trust: 0.8

vendor:turbo linuxmodel:turbolinux advanced serverscope:eqversion:6

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:1.0 (hosting)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:1.0 (workgroup)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux desktopscope:eqversion:10

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:6.1

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:6.5

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:7

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:8

Trust: 0.8

vendor:turbo linuxmodel:turbolinux workstationscope:eqversion:6.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux workstationscope:eqversion:7

Trust: 0.8

vendor:turbo linuxmodel:turbolinux workstationscope:eqversion:8

Trust: 0.8

vendor:check pointmodel:firewall-1 gxscope:eqversion:v2.0

Trust: 0.8

vendor:check pointmodel:provider-1scope:eqversion:ng and later

Trust: 0.8

vendor:check pointmodel:vpn-1/firewall-1scope:eqversion:ng and later

Trust: 0.8

vendor:check pointmodel:vpn-1/firewall-1scope:eqversion:vsx ng with application intelligence

Trust: 0.8

vendor:trend micromodel:trendmicro interscan viruswallscope:eqversion:3.81

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.00

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packardmodel:hp-ux aaa serverscope:lteversion:a.06.01.02.04

Trust: 0.8

vendor:hewlett packardmodel:hp-ux aaa serverscope:eqversion:a.06.01.02.06

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:9

Trust: 0.8

vendor:fujitsumodel:ipcom seriesscope:eqversion:( for details

Trust: 0.8

vendor:fujitsumodel:ipcom seriesscope:eqversion:check the information provided by the vendor. )

Trust: 0.8

vendor:fujitsumodel:netshelter seriesscope:eqversion:( for details

Trust: 0.8

vendor:fujitsumodel:netshelter seriesscope:eqversion:check the information provided by the vendor. )

Trust: 0.8

vendor:fujitsumodel:netwatcherscope:eqversion:( sensor device )

Trust: 0.8

vendor:fujitsumodel:primergy sslacceleratorscope:eqversion:7110

Trust: 0.8

vendor:fujitsumodel:primergy sslacceleratorscope:eqversion:7115

Trust: 0.8

vendor:fujitsumodel:primergy sslacceleratorscope:eqversion:7117

Trust: 0.8

vendor:ciscomodel:ios 12.1 escope: - version: -

Trust: 0.6

vendor:avayamodel:sg208scope: - version: -

Trust: 0.6

vendor:vmwaremodel:gsx server buildscope:eqversion:3.07592

Trust: 0.3

vendor:vmwaremodel:gsx server buildscope:eqversion:2.5.15336

Trust: 0.3

vendor:vmwaremodel:gsx server buildscope:eqversion:2.0.12129

Trust: 0.3

vendor:tarantellamodel:enterprisescope:eqversion:33.40

Trust: 0.3

vendor:tarantellamodel:enterprisescope:eqversion:33.30

Trust: 0.3

vendor:tarantellamodel:enterprisescope:eqversion:33.200

Trust: 0.3

vendor:symantecmodel:clientless vpn gateway seriesscope:eqversion:44005.0

Trust: 0.3

vendor:sunmodel:crypto acceleratorscope:eqversion:40001.0

Trust: 0.3

vendor:stonesoftmodel:stonebeat fullcluster for raptorscope:eqversion:2.5

Trust: 0.3

vendor:stonesoftmodel:stonebeat fullcluster for raptorscope:eqversion:2.0

Trust: 0.3

vendor:stonesoftmodel:stonebeat fullcluster for isa serverscope:eqversion:3.0

Trust: 0.3

vendor:stonesoftmodel:stonebeat fullcluster for gauntletscope:eqversion:2.0

Trust: 0.3

vendor:stonesoftmodel:stonebeat fullcluster for firewall-1scope:eqversion:3.0

Trust: 0.3

vendor:stonesoftmodel:stonebeat fullcluster for firewall-1scope:eqversion:2.0

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:sgimodel:irix mscope:eqversion:6.5.24

Trust: 0.3

vendor:sgimodel:irix mscope:eqversion:6.5.23

Trust: 0.3

vendor:sgimodel:irix mscope:eqversion:6.5.22

Trust: 0.3

vendor:sgimodel:irix mscope:eqversion:6.5.21

Trust: 0.3

vendor:sgimodel:irix fscope:eqversion:6.5.21

Trust: 0.3

vendor:sgimodel:irix mscope:eqversion:6.5.20

Trust: 0.3

vendor:sgimodel:irix fscope:eqversion:6.5.20

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.1.02

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.1

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.0.04

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.0.03

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.0.02

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2.0.01

Trust: 0.3

vendor:securemodel:computing sidewinderscope:eqversion:5.2

Trust: 0.3

vendor:scomodel:unixwarescope:eqversion:7.1.3

Trust: 0.3

vendor:scomodel:unixwarescope:eqversion:7.1.1

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:5.0.7

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:5.0.6

Trust: 0.3

vendor:rsamodel:security bsafe ssl-j sdkscope:eqversion:3.1

Trust: 0.3

vendor:rsamodel:security bsafe ssl-j sdkscope:eqversion:3.0.1

Trust: 0.3

vendor:rsamodel:security bsafe ssl-j sdkscope:eqversion:3.0

Trust: 0.3

vendor:redhatmodel:openssl096b-0.9.6b-3.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssl096-0.9.6-15.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssl-perl-0.9.7a-2.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssl-devel-0.9.7a-2.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:openssl-0.9.7a-2.i386.rpmscope: - version: -

Trust: 0.3

vendor:redhatmodel:linux i386scope:eqversion:7.3

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:redmodel:hat fedora core3scope: - version: -

Trust: 0.3

vendor:redmodel:hat fedora core2scope: - version: -

Trust: 0.3

vendor:redmodel:hat fedora core1scope: - version: -

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl beta3scope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl beta2scope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl beta1scope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:novellmodel:edirectory su1scope:eqversion:8.7.1

Trust: 0.3

vendor:novellmodel:edirectory ascope:eqversion:8.5.12

Trust: 0.3

vendor:netscreenmodel:instant virtual extranetscope:eqversion:3.3.1

Trust: 0.3

vendor:netscreenmodel:instant virtual extranetscope:eqversion:3.3

Trust: 0.3

vendor:netscreenmodel:instant virtual extranetscope:eqversion:3.2

Trust: 0.3

vendor:netscreenmodel:instant virtual extranetscope:eqversion:3.1

Trust: 0.3

vendor:netscreenmodel:instant virtual extranetscope:eqversion:3.0

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.3.1

Trust: 0.3

vendor:lite speedmodel:litespeed web server rc3scope:eqversion:1.3

Trust: 0.3

vendor:lite speedmodel:litespeed web server rc2scope:eqversion:1.3

Trust: 0.3

vendor:lite speedmodel:litespeed web server rc1scope:eqversion:1.3

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.3

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.2.2

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.2.1

Trust: 0.3

vendor:lite speedmodel:litespeed web server rc2scope:eqversion:1.2

Trust: 0.3

vendor:lite speedmodel:litespeed web server rc1scope:eqversion:1.2

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.1.1

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.1

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.0.3

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.0.2

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:eqversion:1.0.1

Trust: 0.3

vendor:hpmodel:wbem a.02.00.01scope: - version: -

Trust: 0.3

vendor:hpmodel:wbem a.02.00.00scope: - version: -

Trust: 0.3

vendor:hpmodel:wbem a.01.05.08scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.0

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:8.5

Trust: 0.3

vendor:hpmodel:aaa serverscope: - version: -

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.8

Trust: 0.3

vendor:computermodel:associates etrust security command centerscope:eqversion:1.0

Trust: 0.3

vendor:citrixmodel:secure gateway for solarisscope:eqversion:1.13

Trust: 0.3

vendor:citrixmodel:secure gateway for solarisscope:eqversion:1.12

Trust: 0.3

vendor:citrixmodel:secure gateway for solarisscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:webns .0.06sscope:eqversion:7.10

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:7.20.0.03

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:7.10.2.06

Trust: 0.3

vendor:ciscomodel:webnsscope:eqversion:7.10.1.02

Trust: 0.3

vendor:ciscomodel:webns b4scope:eqversion:6.10

Trust: 0.3

vendor:ciscomodel:threat responsescope: - version: -

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3.109)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3.102)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2.111

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(3.100)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.5

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(4.101)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:9000

Trust: 0.3

vendor:ciscomodel:ios 12.2zascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sy1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e9scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e14scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 e12scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ea1scope: - version: -

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44900

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:4480

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:2.1(0.208)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:1.1(3.005)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:css11500 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:css11000 content services switchscope: - version: -

Trust: 0.3

vendor:ciscomodel:call managerscope: - version: -

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope: - version: -

Trust: 0.3

vendor:ciscomodel:access registrarscope: - version: -

Trust: 0.3

vendor:checkmodel:point software vpn-1 vsx ng with application intelligencescope: - version: -

Trust: 0.3

vendor:checkmodel:point software vpn-1 next generation fp2scope: - version: -

Trust: 0.3

vendor:checkmodel:point software vpn-1 next generation fp1scope: - version: -

Trust: 0.3

vendor:checkmodel:point software vpn-1 next generation fp0scope: - version: -

Trust: 0.3

vendor:checkmodel:point software providor-1 sp4scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software providor-1 sp3scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software providor-1 sp2scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software providor-1 sp1scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software providor-1scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 vsx ng with application intelligencescope: - version: -

Trust: 0.3

vendor:checkmodel:point software firewall-1 next generation fp2scope: - version: -

Trust: 0.3

vendor:checkmodel:point software firewall-1 next generation fp1scope: - version: -

Trust: 0.3

vendor:checkmodel:point software firewall-1 next generation fp0scope: - version: -

Trust: 0.3

vendor:checkmodel:point software firewall-1 gxscope:eqversion:2.0

Trust: 0.3

vendor:bluemodel:coat systems proxysgscope:eqversion:0

Trust: 0.3

vendor:bluemodel:coat systems cacheos ca/sascope:eqversion:4.1.12

Trust: 0.3

vendor:bluemodel:coat systems cacheos ca/sascope:eqversion:4.1.10

Trust: 0.3

vendor:avayamodel:vsu r2.0.1scope:eqversion:7500

Trust: 0.3

vendor:avayamodel:vsuscope:eqversion:5x0

Trust: 0.3

vendor:avayamodel:vsu r2.0.1scope:eqversion:5000

Trust: 0.3

vendor:avayamodel:vsuscope:eqversion:5000

Trust: 0.3

vendor:avayamodel:vsuscope:eqversion:50

Trust: 0.3

vendor:avayamodel:vsu r2.0.1scope:eqversion:2000

Trust: 0.3

vendor:avayamodel:vsu r2.0.1scope:eqversion:10000

Trust: 0.3

vendor:avayamodel:vsu r2.0.1scope:eqversion:100

Trust: 0.3

vendor:avayamodel:sg5xscope:eqversion:4.4

Trust: 0.3

vendor:avayamodel:sg5xscope:eqversion:4.3

Trust: 0.3

vendor:avayamodel:sg5xscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:sg208scope:eqversion:0

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:intuity r5 r5.1.46scope: - version: -

Trust: 0.3

vendor:avayamodel:intuity audix r5scope:eqversion:0

Trust: 0.3

vendor:avayamodel:intuity s3400scope: - version: -

Trust: 0.3

vendor:avayamodel:intuity s3210scope: - version: -

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:vmwaremodel:gsx serverscope:neversion:2.5.2

Trust: 0.3

vendor:stonesoftmodel:stonegate sparcscope:neversion:2.2.12

Trust: 0.3

vendor:stonesoftmodel:stonegatescope:neversion:2.2.5x86

Trust: 0.3

vendor:stonesoftmodel:stonegate ibm zseriesscope:neversion:2.2.5

Trust: 0.3

vendor:securemodel:computing sidewinderscope:neversion:5.2.1.10

Trust: 0.3

vendor:rsamodel:security bsafe ssl-j sdkscope:neversion:4.1

Trust: 0.3

vendor:opensslmodel:project openssl dscope:neversion:0.9.7

Trust: 0.3

vendor:opensslmodel:project openssl mscope:neversion:0.9.6

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:neversion:1.3.2

Trust: 0.3

vendor:lite speedmodel:litespeed web serverscope:neversion:1.0.2

Trust: 0.3

vendor:citrixmodel:secure gateway for solarisscope:neversion:1.14

Trust: 0.3

vendor:ciscomodel:threat responsescope:neversion:2.0.3

Trust: 0.3

vendor:ciscomodel:mdsscope:neversion:90002.0(0.86)

Trust: 0.3

vendor:ciscomodel:mdsscope:neversion:90001.3(3.33)

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp6scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp5ascope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp5scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp4scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp3scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp2scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp1scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp6scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp5ascope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp5scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp4scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp3scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp2scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp1scope:neversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1scope:neversion:4.1

Trust: 0.3

vendor:4dmodel:webstarscope:neversion:5.3.2

Trust: 0.3

vendor:peoplesoftmodel:oneworld xe/erp8 applications sp22scope: - version: -

Trust: 0.3

vendor:peoplesoftmodel:enterpriseone applicationsscope:eqversion:8.93

Trust: 0.3

vendor:peoplesoftmodel:enterpriseone applications sp2scope:eqversion:8.9

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2.6

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2.0.5

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.0.4

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.0.1.4

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2.6

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2.0.5

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.0.4

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.0.1.4

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.6.0

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.0.5

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.0.4

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.0.1.4

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:9.0.3.1

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:9.0.2.3

Trust: 0.3

vendor:oraclemodel:oracle9i application serverscope:eqversion:1.0.2.2

Trust: 0.3

vendor:oraclemodel:oracle8i standard editionscope:eqversion:8.1.7.4

Trust: 0.3

vendor:oraclemodel:oracle8i enterprise editionscope:eqversion:8.1.7.4.0

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.4

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.3.1

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.3

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.2

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.0.4

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.0.3.1

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.0.3

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.0.2

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.4

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.3.1

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.3

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.2

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.0.3.1

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:9.0.4.1

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:9.0.4.0

Trust: 0.3

vendor:oraclemodel:enterprise manager grid control 10gscope:eqversion:10.1.3

Trust: 0.3

vendor:oraclemodel:enterprise manager grid control 10gscope:eqversion:10.1.0.2

Trust: 0.3

vendor:oraclemodel:enterprise managerscope:eqversion:9.0.4.1

Trust: 0.3

vendor:oraclemodel:enterprise managerscope:eqversion:9.0.4.0

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.10

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.9

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.8

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.7

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.6

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.5

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.4

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.3

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.2

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.1

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5

Trust: 0.3

vendor:oraclemodel:e-business suitescope:eqversion:11.0

Trust: 0.3

vendor:oraclemodel:collaboration suite releasescope:eqversion:29.0.4.2

Trust: 0.3

vendor:oraclemodel:collaboration suite releasescope:eqversion:29.0.4.1

Trust: 0.3

sources: CERT/CC: VU#465542 // BID: 9899 // BID: 13139 // JVNDB: JVNDB-2004-000087 // CNNVD: CNNVD-200411-078 // NVD: CVE-2004-0081

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-0081
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#465542
value: 5.16

Trust: 0.8

NVD: CVE-2004-0081
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200411-078
value: MEDIUM

Trust: 0.6

VULHUB: VHN-8511
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-0081
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-8511
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#465542 // VULHUB: VHN-8511 // JVNDB: JVNDB-2004-000087 // CNNVD: CNNVD-200411-078 // NVD: CVE-2004-0081

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-0081

THREAT TYPE

network

Trust: 0.6

sources: BID: 9899 // BID: 13139

TYPE

Unknown

Trust: 0.6

sources: BID: 9899 // BID: 13139

CONFIGURATIONS

sources: JVNDB: JVNDB-2004-000087

PATCH

title:OpenSSL Vulnerabilityurl:http://www.checkpoint.com/services/techsupport/alerts/openssl.html

Trust: 0.8

title:HPSBUX01011url:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00897351

Trust: 0.8

title:HPSBUX01011url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX01011.html

Trust: 0.8

title:NetScreen Advisory 58466url:http://www.juniper.net/support/security/alerts/adv58466-2.txt

Trust: 0.8

title:openssl096url:http://www.miraclelinux.com/support/update/list.php?errata_id=155

Trust: 0.8

title:Top Pageurl:http://www.openssl.org/

Trust: 0.8

title:RHSA-2004:119url:https://rhn.redhat.com/errata/RHSA-2004-119.html

Trust: 0.8

title:RHSA-2004:121url:https://rhn.redhat.com/errata/RHSA-2004-121.html

Trust: 0.8

title:RHSA-2004:120url:https://rhn.redhat.com/errata/RHSA-2004-120.html

Trust: 0.8

title:20040304-01-Uurl:ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc

Trust: 0.8

title:57571url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-1

Trust: 0.8

title:57524url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-1

Trust: 0.8

title:57571url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57571-3

Trust: 0.8

title:57524url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57524-3

Trust: 0.8

title:19387url:http://kb.trendmicro.com/solutions/solutionDetail.asp?solutionID=19387

Trust: 0.8

title:TLSA-2004-9url:http://www.turbolinux.com/security/2004/TLSA-2004-9.txt

Trust: 0.8

title:OpenSSL に関する脆弱性url:http://www.checkpoint.co.jp/techsupport/alerts/openssl.html

Trust: 0.8

title:RHSA-2004:120url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2004-120J.html

Trust: 0.8

title:RHSA-2004:119url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2004-119J.html

Trust: 0.8

title:openssl にセキュリティホールurl:http://vinelinux.org/errata/25x/20040319-1.html

Trust: 0.8

title:TLSA-2004-9url:http://www.turbolinux.co.jp/security/2004/TLSA-2004-9j.txt

Trust: 0.8

title:IPCOMシリーズのOpenSSL脆弱性への対応についてurl:http://primeserver.fujitsu.com/ipcom/support/security20040325/

Trust: 0.8

title:[重要] OpenSSL脆弱性への対応についてurl:http://jp.fujitsu.com/support/security/backnumber/2004/0325/

Trust: 0.8

title:224012url:http://software.fujitsu.com/jp/security/vulnerabilities/cert/niscc.html#224012-OpenSSL

Trust: 0.8

title:OpenSSL Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=169015

Trust: 0.6

sources: JVNDB: JVNDB-2004-000087 // CNNVD: CNNVD-200411-078

EXTERNAL IDS

db:CERT/CCid:VU#465542

Trust: 3.3

db:NVDid:CVE-2004-0081

Trust: 3.1

db:BIDid:9899

Trust: 2.8

db:USCERTid:TA04-078A

Trust: 2.5

db:SECUNIAid:11139

Trust: 1.7

db:SECTRACKid:1009458

Trust: 0.8

db:XFid:15509

Trust: 0.8

db:JVNDBid:JVNDB-2004-000087

Trust: 0.8

db:CNNVDid:CNNVD-200411-078

Trust: 0.7

db:BIDid:13139

Trust: 0.3

db:VULHUBid:VHN-8511

Trust: 0.1

db:SECUNIAid:17398

Trust: 0.1

db:PACKETSTORMid:41200

Trust: 0.1

db:SECUNIAid:17381

Trust: 0.1

db:PACKETSTORMid:41105

Trust: 0.1

sources: CERT/CC: VU#465542 // VULHUB: VHN-8511 // BID: 9899 // BID: 13139 // JVNDB: JVNDB-2004-000087 // PACKETSTORM: 41200 // PACKETSTORM: 41105 // CNNVD: CNNVD-200411-078 // NVD: CVE-2004-0081

REFERENCES

url:http://www.uniras.gov.uk/vuls/2004/224012/index.htm

Trust: 2.5

url:http://www.securityfocus.com/bid/9899

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta04-078a.html

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/465542

Trust: 2.5

url:http://rhn.redhat.com/errata/rhsa-2004-119.html

Trust: 2.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml

Trust: 2.0

url:http://www.debian.org/security/2004/dsa-465

Trust: 1.7

url:http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html

Trust: 1.7

url:http://fedoranews.org/updates/fedora-2004-095.shtml

Trust: 1.7

url:http://security.gentoo.org/glsa/glsa-200403-03.xml

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11755

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a871

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a902

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2004-120.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2004-121.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2004-139.html

Trust: 1.7

url:http://secunia.com/advisories/11139

Trust: 1.7

url:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524

Trust: 1.7

url:http://www.trustix.org/errata/2004/0012

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/15509

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=107955049331965&w=2

Trust: 1.6

url:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=108403850228012&w=2

Trust: 1.6

url:ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.10/scosa-2004.10.txt

Trust: 1.1

url:ftp://patches.sgi.com/support/free/security/advisories/20040304-01-u.asc

Trust: 1.1

url:http://www.openssl.org

Trust: 0.8

url:http://cvs.openssl.org/chngview?cn=5721

Trust: 0.8

url:http://cvs.openssl.org/chngview?cn=5722

Trust: 0.8

url:http://cvs.openssl.org/getfile?v=1.618.2.137&f=openssl/changes

Trust: 0.8

url:http://cvs.openssl.org/getfile?v=1.954&f=openssl/changes

Trust: 0.8

url:http://www.ciac.org/ciac/bulletins/o-101.shtml

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0081

Trust: 0.8

url:http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20040317-00389.xml

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/15509

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2004/wr041201.txt

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2004/wr041301.txt

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2004/wr041701.txt

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2004/wr041801.txt

Trust: 0.8

url:http://jvn.jp/niscc/niscc-224012

Trust: 0.8

url:http://jvn.jp/cert/jvnta04-078a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta04-078a

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0081

Trust: 0.8

url:http://www.cpni.gov.uk/docs/re-20040317-00389.pdf?lang=en

Trust: 0.8

url:http://www.securitytracker.com/alerts/2004/mar/1009458.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/20040318_082932.html

Trust: 0.8

url:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57524

Trust: 0.6

url:http://www.4d.com/products/4dwsv.html

Trust: 0.3

url:http://support.avaya.com/japple/css/japple?page=avaya.css.openpage&temp.template.name=securityadvisory

Trust: 0.3

url:http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000827

Trust: 0.3

url:http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000834

Trust: 0.3

url:ftp://ftp.symantec.com/public/english_us_canada/products/sym_clientless_vpn/sym_clientless_vpn_5/updates/hf1-readme.txt

Trust: 0.3

url:http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1256

Trust: 0.3

url:http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1257

Trust: 0.3

url:http://www.netscreen.com/services/security/alerts/adv58466-signed.txt

Trust: 0.3

url:http://www.stonesoft.com/document/art/3123.html

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2005-239.htm

Trust: 0.3

url:http://www.checkpoint.com/techsupport/alerts/openssl.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2004-120.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2004-139.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2005-830.html

Trust: 0.3

url:http://www.bluecoat.com/support/knowledge/advisory_openssl_can-2004-0079.html

Trust: 0.3

url:http://www.apple.com/support/downloads/securityupdate_2004-04-05_(10_3_3).html

Trust: 0.3

url:http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968981.htm

Trust: 0.3

url:http://www.securecomputing.com/pdf/52110relnotes.pdf

Trust: 0.3

url:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f57571

Trust: 0.3

url:http://www.tarantella.com/security/bulletin-10.html

Trust: 0.3

url:http://www.adiscon.com/common/en/advisory/2004-03-18.asp

Trust: 0.3

url:http://www.uniras.gov.uk/l1/l2/l3/alerts2004/alert-1204.txt

Trust: 0.3

url:http://www.litespeedtech.com

Trust: 0.3

url:/archive/1/357672

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/pdf/cpuapr2005.pdf

Trust: 0.3

url:http://www.oracle.com/index.html

Trust: 0.3

url:http://www.peoplesoft.com:80/corp/en/support/security_index.jsp

Trust: 0.3

url:/archive/1/395699

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/11139/

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://marc.info/?l=bugtraq&m=107955049331965&w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&m=108403850228012&w=2

Trust: 0.1

url:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834

Trust: 0.1

url:http://secunia.com/product/48/

Trust: 0.1

url:http://rhn.redhat.com/errata/rhsa-2005-829.html

Trust: 0.1

url:http://rhn.redhat.com/

Trust: 0.1

url:http://secunia.com/product/1326/

Trust: 0.1

url:http://secunia.com/product/1306/

Trust: 0.1

url:http://secunia.com/advisories/17398/

Trust: 0.1

url:http://secunia.com/product/1044/

Trust: 0.1

url:http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

Trust: 0.1

url:http://secunia.com/product/4222/

Trust: 0.1

url:http://secunia.com/advisories/17381/

Trust: 0.1

url:http://secunia.com/advisories/10133/

Trust: 0.1

sources: CERT/CC: VU#465542 // VULHUB: VHN-8511 // BID: 9899 // BID: 13139 // JVNDB: JVNDB-2004-000087 // PACKETSTORM: 41200 // PACKETSTORM: 41105 // CNNVD: CNNVD-200411-078 // NVD: CVE-2004-0081

CREDITS

David Litchfield※ david@nextgenss.com

Trust: 0.6

sources: CNNVD: CNNVD-200411-078

SOURCES

db:CERT/CCid:VU#465542
db:VULHUBid:VHN-8511
db:BIDid:9899
db:BIDid:13139
db:JVNDBid:JVNDB-2004-000087
db:PACKETSTORMid:41200
db:PACKETSTORMid:41105
db:CNNVDid:CNNVD-200411-078
db:NVDid:CVE-2004-0081

LAST UPDATE DATE

2024-08-14T12:22:55.369000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#465542date:2005-05-06T00:00:00
db:VULHUBid:VHN-8511date:2018-10-30T00:00:00
db:BIDid:9899date:2015-03-19T08:20:00
db:BIDid:13139date:2006-05-05T23:30:00
db:JVNDBid:JVNDB-2004-000087date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200411-078date:2021-11-09T00:00:00
db:NVDid:CVE-2004-0081date:2021-11-08T15:48:31.743

SOURCES RELEASE DATE

db:CERT/CCid:VU#465542date:2004-03-17T00:00:00
db:VULHUBid:VHN-8511date:2004-11-23T00:00:00
db:BIDid:9899date:2004-03-17T00:00:00
db:BIDid:13139date:2005-04-12T00:00:00
db:JVNDBid:JVNDB-2004-000087date:2007-04-01T00:00:00
db:PACKETSTORMid:41200date:2005-11-03T01:02:14
db:PACKETSTORMid:41105date:2005-11-02T01:11:22
db:CNNVDid:CNNVD-200411-078date:2003-07-18T00:00:00
db:NVDid:CVE-2004-0081date:2004-11-23T05:00:00