ID

VAR-201605-0079


CVE

CVE-2016-2109


TITLE

OpenSSL of ASN.1 BIO Implementation of crypto/asn1/a_d2i_fp.c of asn1_d2i_read_bio Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-002476

DESCRIPTION

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding. OpenSSL is prone to a local denial-of-service vulnerability. An attacker may exploit this issue to crash the application or consume excessive amount of data, resulting in denial-of-service conditions. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: openssl security update Advisory ID: RHSA-2016:0996-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0996.html Issue date: 2016-05-10 CVE Names: CVE-2016-0799 CVE-2016-2105 CVE-2016-2106 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 CVE-2016-2842 ===================================================================== 1. Summary: An update for openssl is now available for Red Hat Enterprise Linux 6. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. A remote attacker could use these flaws to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105, CVE-2016-2106) * It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-0799, CVE-2016-2842) * A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. (CVE-2016-2109) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-2108, CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, and CVE-2016-0799. Upstream acknowledges Huzaifa Sidhpurwala (Red Hat), Hanno Böck, and David Benjamin (Google) as the original reporters of CVE-2016-2108; Guido Vranken as the original reporter of CVE-2016-2842, CVE-2016-2105, CVE-2016-2106, and CVE-2016-0799; and Juraj Somorovsky as the original reporter of CVE-2016-2107. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1312219 - CVE-2016-0799 OpenSSL: Fix memory issues in BIO_*printf functions 1314757 - CVE-2016-2842 openssl: doapr_outch function does not verify that certain memory allocation succeeds 1330101 - CVE-2016-2109 openssl: ASN.1 BIO handling of large amounts of data 1331402 - CVE-2016-2108 openssl: Memory corruption in the ASN.1 encoder 1331426 - CVE-2016-2107 openssl: Padding oracle in AES-NI CBC MAC check 1331441 - CVE-2016-2105 openssl: EVP_EncodeUpdate overflow 1331536 - CVE-2016-2106 openssl: EVP_EncryptUpdate overflow 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssl-1.0.1e-48.el6_8.1.src.rpm i386: openssl-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm x86_64: openssl-1.0.1e-48.el6_8.1.i686.rpm openssl-1.0.1e-48.el6_8.1.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-devel-1.0.1e-48.el6_8.1.i686.rpm openssl-perl-1.0.1e-48.el6_8.1.i686.rpm openssl-static-1.0.1e-48.el6_8.1.i686.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.1.i686.rpm openssl-devel-1.0.1e-48.el6_8.1.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.1.x86_64.rpm openssl-static-1.0.1e-48.el6_8.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssl-1.0.1e-48.el6_8.1.src.rpm x86_64: openssl-1.0.1e-48.el6_8.1.i686.rpm openssl-1.0.1e-48.el6_8.1.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.1.i686.rpm openssl-devel-1.0.1e-48.el6_8.1.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.1.x86_64.rpm openssl-static-1.0.1e-48.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssl-1.0.1e-48.el6_8.1.src.rpm i386: openssl-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-devel-1.0.1e-48.el6_8.1.i686.rpm ppc64: openssl-1.0.1e-48.el6_8.1.ppc.rpm openssl-1.0.1e-48.el6_8.1.ppc64.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.ppc.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.ppc64.rpm openssl-devel-1.0.1e-48.el6_8.1.ppc.rpm openssl-devel-1.0.1e-48.el6_8.1.ppc64.rpm s390x: openssl-1.0.1e-48.el6_8.1.s390.rpm openssl-1.0.1e-48.el6_8.1.s390x.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.s390.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.s390x.rpm openssl-devel-1.0.1e-48.el6_8.1.s390.rpm openssl-devel-1.0.1e-48.el6_8.1.s390x.rpm x86_64: openssl-1.0.1e-48.el6_8.1.i686.rpm openssl-1.0.1e-48.el6_8.1.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.1.i686.rpm openssl-devel-1.0.1e-48.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-perl-1.0.1e-48.el6_8.1.i686.rpm openssl-static-1.0.1e-48.el6_8.1.i686.rpm ppc64: openssl-debuginfo-1.0.1e-48.el6_8.1.ppc64.rpm openssl-perl-1.0.1e-48.el6_8.1.ppc64.rpm openssl-static-1.0.1e-48.el6_8.1.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-48.el6_8.1.s390x.rpm openssl-perl-1.0.1e-48.el6_8.1.s390x.rpm openssl-static-1.0.1e-48.el6_8.1.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.1.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.1.x86_64.rpm openssl-static-1.0.1e-48.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssl-1.0.1e-48.el6_8.1.src.rpm i386: openssl-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-devel-1.0.1e-48.el6_8.1.i686.rpm x86_64: openssl-1.0.1e-48.el6_8.1.i686.rpm openssl-1.0.1e-48.el6_8.1.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.1.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.1.i686.rpm openssl-devel-1.0.1e-48.el6_8.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.1.i686.rpm openssl-perl-1.0.1e-48.el6_8.1.i686.rpm openssl-static-1.0.1e-48.el6_8.1.i686.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.1.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.1.x86_64.rpm openssl-static-1.0.1e-48.el6_8.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-0799 https://access.redhat.com/security/cve/CVE-2016-2105 https://access.redhat.com/security/cve/CVE-2016-2106 https://access.redhat.com/security/cve/CVE-2016-2107 https://access.redhat.com/security/cve/CVE-2016-2108 https://access.redhat.com/security/cve/CVE-2016-2109 https://access.redhat.com/security/cve/CVE-2016-2842 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXMXPXXlSAg2UNWIIRAmqpAJ4sxaxPc4fbLjR32h/PW1fxwOZG7ACgtaSz 6dbI0EemYRoHCDagPHSycq4= =g2Zb -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. ============================================================================ Ubuntu Security Notice USN-2959-1 May 03, 2016 openssl vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in OpenSSL. (CVE-2016-2109) As a security improvement, this update also modifies OpenSSL behaviour to reject DH key sizes below 1024 bits, preventing a possible downgrade attack. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.1 Ubuntu 15.10: libssl1.0.0 1.0.2d-0ubuntu1.5 Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.19 Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.36 After a standard system update you need to reboot your computer to make all the necessary changes. This could lead to a heap corruption. This could lead to a heap corruption. CVE-2016-2107 Juraj Somorovsky discovered a padding oracle in the AES CBC cipher implementation based on the AES-NI instruction set. This could allow an attacker to decrypt TLS traffic encrypted with one of the cipher suites based on AES CBC. CVE-2016-2108 David Benjamin from Google discovered that two separate bugs in the ASN.1 encoder, related to handling of negative zero integer values and large universal tags, could lead to an out-of-bounds write. For the unstable distribution (sid), these problems have been fixed in version 1.0.2h-1. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release includes bug fixes and enhancements, as well as a new release of OpenSSL that addresses a number of outstanding security flaws. For further information, see the knowledge base article linked to in the References section. The JBoss server process must be restarted for the update to take effect. (CVE-2016-2108) * Multiple flaws were found in the way httpd parsed HTTP requests and responses using chunked transfer encoding. A remote attacker could use these flaws to create a specially crafted request, which httpd would decode differently from an HTTP proxy software in front of it, possibly leading to HTTP request smuggling attacks. (CVE-2015-3195) * A flaw was found in the way the TLS protocol composes the Diffie-Hellman exchange (for both export and non-export grade cipher suites). An attacker could use this flaw to downgrade a DHE connection to use export-grade key sizes, which could then be broken by sufficient pre-computation. This can lead to a passive man-in-the-middle attack in which the attacker is able to decrypt all traffic. (CVE-2016-2106) * It was discovered that it is possible to remotely Segfault Apache http server with a specially crafted string sent to the mod_cluster via service messages (MCMP). (CVE-2016-2109) * It was discovered that specifying configuration with a JVMRoute path longer than 80 characters will cause segmentation fault leading to a server crash. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05320149 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05320149 Version: 1 HPSBMU03653 rev.1 - HPE System Management Homepage (SMH), Remote Arbitrary Code Execution, Cross-Site Scripting (XSS), Denial of Service (DoS), Unauthorized Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-10-26 Last Updated: 2016-10-26 Potential Security Impact: Remote: Arbitrary Code Execution, Cross-Site Scripting (XSS), Denial of Service (DoS), Unauthorized Disclosure of Information Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Multiple potential security vulnerabilities have been identified in HPE System Management Homepage (SMH) on Windows and Linux. The vulnerabilities could be remotely exploited using man-in-the-middle (MITM) attacks resulting in cross-site scripting (XSS), arbitrary code execution, Denial of Service (DoS), and/or unauthorized disclosure of information. References: - CVE-2016-2107 - OpenSSL, Unauthorized disclosure of information - CVE-2016-2106 - OpenSSL, Denial of Service (DoS) - CVE-2016-2109 - OpenSSL, Denial of Service (DoS) - CVE-2016-2105 - OpenSSL, Denial of Service (DoS) - CVE-2016-3739 - cURL and libcurl, Remote code execution - CVE-2016-5388 - "HTTPoxy", Apache Tomcat - CVE-2016-5387 - "HTTPoxy", Apache HTTP Server - CVE-2016-5385 - "HTTPoxy", PHP - CVE-2016-4543 - PHP, multiple impact - CVE-2016-4071 - PHP, multiple impact - CVE-2016-4072 - PHP, multiple impact - CVE-2016-4542 - PHP, multiple impact - CVE-2016-4541 - PHP, multiple impact - CVE-2016-4540 - PHP, multiple impact - CVE-2016-4539 - PHP, multiple impact - CVE-2016-4538 - PHP, multiple impact - CVE-2016-4537 - PHP, multiple impact - CVE-2016-4343 - PHP, multiple impact - CVE-2016-4342 - PHP, multiple impact - CVE-2016-4070 - PHP, Denial of Service (DoS) - CVE-2016-4393 - PSRT110263, XSS vulnerability - CVE-2016-4394 - PSRT110263, HSTS vulnerability - CVE-2016-4395 - ZDI-CAN-3722, PSRT110115, Buffer Overflow - CVE-2016-4396 - ZDI-CAN-3730, PSRT110116, Buffer Overflow - PSRT110145 - PSRT110263 - PSRT110115 - PSRT110116 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HPE System Management Homepage - all versions prior to v7.6 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2016-2105 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2016-2106 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2016-2107 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N 2.6 (AV:N/AC:H/Au:N/C:P/I:N/A:N) CVE-2016-2109 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C) CVE-2016-3739 5.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N) CVE-2016-4070 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2016-4071 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4072 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4342 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 8.3 (AV:N/AC:M/Au:N/C:P/I:P/A:C) CVE-2016-4343 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) CVE-2016-4393 4.2 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N 4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N) CVE-2016-4394 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L 5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P) CVE-2016-4395 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N 7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N) CVE-2016-4396 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N 7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N) CVE-2016-4537 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4538 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4539 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4540 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4541 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4542 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-4543 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-5385 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) CVE-2016-5387 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) CVE-2016-5388 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 * Hewlett Packard Enterprise thanks Tenable Network Security for working with Trend Micro's Zero Day Initiative (ZDI) for reporting CVE-2016-4395 and CVE-2016-4396 to security-alert@hpe.com RESOLUTION HPE has made the following software updates available to resolve the vulnerabilities for the impacted versions of System Management Homepage (SMH). Please download and install HPE System Management Homepage (SMH) v7.6.0 from the following locations: * <https://www.hpe.com/us/en/product-catalog/detail/pip.344313.html> HISTORY Version:1 (rev.1) - 26 October 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. References: - CVE-2016-2105 - openssl - CVE-2016-2106 - openssl - CVE-2016-2107 - openssl - CVE-2016-2108 - openssl - CVE-2016-2109 - openssl - CVE-2016-2176 - openssl SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. OpenSSL Security Advisory [3rd May 2016] ======================================== Memory corruption in the ASN.1 encoder (CVE-2016-2108) ====================================================== Severity: High This issue affected versions of OpenSSL prior to April 2015. The bug causing the vulnerability was fixed on April 18th 2015, and released as part of the June 11th 2015 security releases. The security impact of the bug was not known at the time. In previous versions of OpenSSL, ASN.1 encoding the value zero represented as a negative integer can cause a buffer underflow with an out-of-bounds write in i2c_ASN1_INTEGER. The ASN.1 parser does not normally create "negative zeroes" when parsing ASN.1 input, and therefore, an attacker cannot trigger this bug. However, a second, independent bug revealed that the ASN.1 parser (specifically, d2i_ASN1_TYPE) can misinterpret a large universal tag as a negative zero value. Large universal tags are not present in any common ASN.1 structures (such as X509) but are accepted as part of ANY structures. Therefore, if an application deserializes untrusted ASN.1 structures containing an ANY field, and later reserializes them, an attacker may be able to trigger an out-of-bounds write. This has been shown to cause memory corruption that is potentially exploitable with some malloc implementations. Applications that parse and re-encode X509 certificates are known to be vulnerable. Applications that verify RSA signatures on X509 certificates may also be vulnerable; however, only certificates with valid signatures trigger ASN.1 re-encoding and hence the bug. Specifically, since OpenSSL's default TLS X509 chain verification code verifies the certificate chain from root to leaf, TLS handshakes could only be targeted with valid certificates issued by trusted Certification Authorities. OpenSSL 1.0.2 users should upgrade to 1.0.2c OpenSSL 1.0.1 users should upgrade to 1.0.1o This vulnerability is a combination of two bugs, neither of which individually has security impact. The first bug (mishandling of negative zero integers) was reported to OpenSSL by Huzaifa Sidhpurwala (Red Hat) and independently by Hanno Böck in April 2015. The second issue (mishandling of large universal tags) was found using libFuzzer, and reported on the public issue tracker on March 1st 2016. The fact that these two issues combined present a security vulnerability was reported by David Benjamin (Google) on March 31st 2016. The fixes were developed by Steve Henson of the OpenSSL development team, and David Benjamin. The OpenSSL team would also like to thank Mark Brand and Ian Beer from the Google Project Zero team for their careful analysis of the impact. The fix for the "negative zero" memory corruption bug can be identified by commits 3661bb4e7934668bd99ca777ea8b30eedfafa871 (1.0.2) and 32d3b0f52f77ce86d53f38685336668d47c5bdfe (1.0.1) Padding oracle in AES-NI CBC MAC check (CVE-2016-2107) ====================================================== Severity: High A MITM attacker can use a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server support AES-NI. This issue was introduced as part of the fix for Lucky 13 padding attack (CVE-2013-0169). The padding check was rewritten to be in constant time by making sure that always the same bytes are read and compared against either the MAC or padding bytes. But it no longer checked that there was enough data to have both the MAC and padding bytes. OpenSSL 1.0.2 users should upgrade to 1.0.2h OpenSSL 1.0.1 users should upgrade to 1.0.1t This issue was reported to OpenSSL on 13th of April 2016 by Juraj Somorovsky using TLS-Attacker. The fix was developed by Kurt Roeckx of the OpenSSL development team. EVP_EncodeUpdate overflow (CVE-2016-2105) ========================================= Severity: Low An overflow can occur in the EVP_EncodeUpdate() function which is used for Base64 encoding of binary data. If an attacker is able to supply very large amounts of input data then a length check can overflow resulting in a heap corruption. Internally to OpenSSL the EVP_EncodeUpdate() function is primarly used by the PEM_write_bio* family of functions. These are mainly used within the OpenSSL command line applications. These internal uses are not considered vulnerable because all calls are bounded with length checks so no overflow is possible. User applications that call these APIs directly with large amounts of untrusted data may be vulnerable. (Note: Initial analysis suggested that the PEM_write_bio* were vulnerable, and this is reflected in the patch commit message. This is no longer believed to be the case). OpenSSL 1.0.2 users should upgrade to 1.0.2h OpenSSL 1.0.1 users should upgrade to 1.0.1t This issue was reported to OpenSSL on 3rd March 2016 by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team. EVP_EncryptUpdate overflow (CVE-2016-2106) ========================================== Severity: Low An overflow can occur in the EVP_EncryptUpdate() function. If an attacker is able to supply very large amounts of input data after a previous call to EVP_EncryptUpdate() with a partial block then a length check can overflow resulting in a heap corruption. Following an analysis of all OpenSSL internal usage of the EVP_EncryptUpdate() function all usage is one of two forms. The first form is where the EVP_EncryptUpdate() call is known to be the first called function after an EVP_EncryptInit(), and therefore that specific call must be safe. The second form is where the length passed to EVP_EncryptUpdate() can be seen from the code to be some small value and therefore there is no possibility of an overflow. Since all instances are one of these two forms, it is believed that there can be no overflows in internal code due to this problem. It should be noted that EVP_DecryptUpdate() can call EVP_EncryptUpdate() in certain code paths. Also EVP_CipherUpdate() is a synonym for EVP_EncryptUpdate(). All instances of these calls have also been analysed too and it is believed there are no instances in internal usage where an overflow could occur. This could still represent a security issue for end user code that calls this function directly. OpenSSL 1.0.2 users should upgrade to 1.0.2h OpenSSL 1.0.1 users should upgrade to 1.0.1t This issue was reported to OpenSSL on 3rd March 2016 by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team. Any application parsing untrusted data through d2i BIO functions is affected. The memory based functions such as d2i_X509() are *not* affected. Since the memory based functions are used by the TLS library, TLS applications are not affected. OpenSSL 1.0.2 users should upgrade to 1.0.2h OpenSSL 1.0.1 users should upgrade to 1.0.1t This issue was reported to OpenSSL on 4th April 2016 by Brian Carpenter. The fix was developed by Stephen Henson of the OpenSSL development team. EBCDIC overread (CVE-2016-2176) =============================== Severity: Low ASN1 Strings that are over 1024 bytes can cause an overread in applications using the X509_NAME_oneline() function on EBCDIC systems. This could result in arbitrary stack data being returned in the buffer. OpenSSL 1.0.2 users should upgrade to 1.0.2h OpenSSL 1.0.1 users should upgrade to 1.0.1t This issue was reported to OpenSSL on 5th March 2016 by Guido Vranken. The fix was developed by Matt Caswell of the OpenSSL development team. Note ==== As per our previous announcements and our Release Strategy (https://www.openssl.org/policies/releasestrat.html), support for OpenSSL version 1.0.1 will cease on 31st December 2016. No security updates for that version will be provided after that date. Users of 1.0.1 are advised to upgrade. Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer receiving security updates. References ========== URL for this Security Advisory: https://www.openssl.org/news/secadv/20160503.txt Note: the online version of the advisory may be updated with additional details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html

Trust: 2.61

sources: NVD: CVE-2016-2109 // JVNDB: JVNDB-2016-002476 // BID: 87940 // VULMON: CVE-2016-2109 // PACKETSTORM: 136958 // PACKETSTORM: 136895 // PACKETSTORM: 136893 // PACKETSTORM: 139114 // PACKETSTORM: 139379 // PACKETSTORM: 143513 // PACKETSTORM: 169652

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.2

Trust: 1.9

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.9

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.2

Trust: 1.9

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.6

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.6

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.6

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.6

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6.0

Trust: 1.6

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.6

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.6

vendor:opensslmodel:opensslscope:eqversion:1.0.2d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2e

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.1s

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2b

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7.0

Trust: 1.0

vendor:necmodel:esmpro/serveragentservicescope:eqversion:all versions (linux)

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:express

Trust: 0.8

vendor:necmodel:webotx application serverscope:eqversion:enterprise v8.2 to v9.4

Trust: 0.8

vendor:hitachimodel:cosminexus primary serverscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional for plug-in

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v8.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:(v. 7)

Trust: 0.8

vendor:necmodel:ip38x/3000scope: - version: -

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:none

Trust: 0.8

vendor:necmodel:webotx application serverscope:eqversion:foundation v8.2 to v8.5

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:- security enhancement

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:- messaging

Trust: 0.8

vendor:necmodel:websamscope:eqversion:6.2

Trust: 0.8

vendor:hitachimodel:cosminexus application server version 5scope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:(v. 7)

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:(v. 6)

Trust: 0.8

vendor:necmodel:ip38x/3500scope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developer standardscope: - version: -

Trust: 0.8

vendor:necmodel:ip38x/fw120scope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc node eusscope:eqversion:(v. 7.2)

Trust: 0.8

vendor:necmodel:ip38x/1200scope: - version: -

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v3.0

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:01

Trust: 0.8

vendor:necmodel:webotx application serverscope:eqversion:st ard v8.2 to v9.4

Trust: 0.8

vendor:opensslmodel:opensslscope:ltversion:1.0.1

Trust: 0.8

vendor:necmodel:enterprisedirectoryserverscope:eqversion:ver6.1 to v8.0

Trust: 0.8

vendor:hitachimodel:ucosminexus application server smart editionscope: - version: -

Trust: 0.8

vendor:necmodel:secureware/pki application development kitscope:eqversion:ver3.2

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v3.1

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v6.2

Trust: 0.8

vendor:necmodel:websamscope:eqversion:netvisorpro 6.1

Trust: 0.8

vendor:necmodel:ip38x/810scope: - version: -

Trust: 0.8

vendor:necmodel:webotx enterprise service busscope:eqversion:v8.2 to v9.3

Trust: 0.8

vendor:necmodel:ip38x/n500scope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developer lightscope: - version: -

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:/sg series sg3600lm/lg/lj v6.1

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v7.0

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:/sg series intersecvm/sg v1.2

Trust: 0.8

vendor:necmodel:ip38x/1210scope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:(v. 6)

Trust: 0.8

vendor:hitachimodel:cosminexus developer version 5scope: - version: -

Trust: 0.8

vendor:necmodel:webotx application serverscope:eqversion:express v8.2 to v9.4

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:(v. 7)

Trust: 0.8

vendor:hitachimodel:cosminexus developer light version 6scope: - version: -

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v7.1

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:st ard-r

Trust: 0.8

vendor:hitachimodel:ucosminexus primary serverscope:eqversion:base

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:(v. 6)

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:none

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion:1.0.1t

Trust: 0.8

vendor:necmodel:capssuitescope:eqversion:v3.0 to v4.0

Trust: 0.8

vendor:hitachimodel:cosminexus primary serverscope:eqversion:base version 6

Trust: 0.8

vendor:hitachimodel:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:necmodel:univergescope:eqversion:business connect v7.1.1

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux server ausscope:eqversion:(v. 7.2)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.11 and later

Trust: 0.8

vendor:hitachimodel:ucosminexus application server enterprisescope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope:ltversion:1.0.2

Trust: 0.8

vendor:necmodel:ip38x/5000scope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:(v. 7)

Trust: 0.8

vendor:red hatmodel:enterprise linux server eusscope:eqversion:(v. 7.2)

Trust: 0.8

vendor:necmodel:websamscope:eqversion:7.0

Trust: 0.8

vendor:necmodel:ip38x/sr100scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus application server standardscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:ucosminexus application server standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developer standard version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer professional version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion:1.0.2h

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v8.2

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:/sg series univerge sg3000lg/lj

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:(v. 6)

Trust: 0.8

vendor:ciscomodel:registered envelope servicescope:eqversion:0

Trust: 0.6

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.6

vendor:ciscomodel:paging serverscope:neversion:11.5.1

Trust: 0.6

vendor:ciscomodel:nexus series switches 5.2 sv3scope:neversion:1000v

Trust: 0.6

vendor:ciscomodel:network performance analyticsscope:eqversion:0

Trust: 0.6

vendor:ciscomodel:ironport encryption appliancescope:eqversion:0

Trust: 0.6

vendor:ciscomodel:spa51x series ip phonesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mate collectorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ata series analog terminal adaptorscope:eqversion:1900

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:network health frameworkscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence server on virtual machinescope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:spa232d multi-line dect atascope:eqversion:0

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.2.2.1

Trust: 0.3

vendor:ciscomodel:unified series ip phonesscope:neversion:780011.5.2

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.3.0.0

Trust: 0.3

vendor:ciscomodel:clean access managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector netflowscope:neversion:6.8

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:10.5(3.10000.9)

Trust: 0.3

vendor:ciscomodel:hosted collaboration mediation fulfillmentscope:eqversion:10.6(3)

Trust: 0.3

vendor:freebsdmodel:10.2-release-p8scope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.3

Trust: 0.3

vendor:ciscomodel:proactive network operations centerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence server mr2scope:neversion:87104.2

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.40

Trust: 0.3

vendor:ciscomodel:emergency responderscope:neversion:11.5

Trust: 0.3

vendor:ciscomodel:video distribution suite for internet streamingscope:neversion:4.3.2

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.2.2

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.53

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.6.0

Trust: 0.3

vendor:ciscomodel:video surveillance media serverscope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch udp directorscope:neversion:6.8.2

Trust: 0.3

vendor:ciscomodel:nexus series blade switches 0.9.8zfscope:neversion:4000

Trust: 0.3

vendor:ciscomodel:telepresence isdn linkscope:neversion:1.1.6

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.0.5

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2gscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.3.0.1

Trust: 0.3

vendor:ciscomodel:tandberg codian isdn gwscope:eqversion:32400

Trust: 0.3

vendor:ciscomodel:telepresence sx seriesscope:neversion:7.3.7

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1ascope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.6

Trust: 0.3

vendor:ciscomodel:unified intelligent contact management enterprisescope:neversion:11.51

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.0.4

Trust: 0.3

vendor:ciscomodel:telepresence mcuscope:eqversion:85100

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.131

Trust: 0.3

vendor:ciscomodel:unified workforce optimizationscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.2.1

Trust: 0.3

vendor:oraclemodel:enterprise managerscope:eqversion:12.1.4

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector netflowscope:neversion:6.8.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.5.0.2

Trust: 0.3

vendor:ciscomodel:mediasense 9.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:abyp-4tl-pscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:cognos business intelligence interim fixscope:neversion:10.1.119

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.1209

Trust: 0.3

vendor:ciscomodel:asr seriesscope:eqversion:50000

Trust: 0.3

vendor:ibmmodel:aspera sharesscope:neversion:1.9.6

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.4.0.0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p26scope: - version: -

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3400

Trust: 0.3

vendor:ciscomodel:enterprise content delivery systemscope:neversion:2.6.8

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.2.0.2

Trust: 0.3

vendor:ciscomodel:prime collaboration assurance sp1scope:neversion:11.5

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors fp3scope:eqversion:4.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:10.5(1)

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.0.3

Trust: 0.3

vendor:ibmmodel:workload deployerscope:eqversion:3.16

Trust: 0.3

vendor:ciscomodel:unified contact center enterprisescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:88310

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.5

Trust: 0.3

vendor:ciscomodel:intelligent automation for cloudscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber guestscope:eqversion:10.0(2)

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3361

Trust: 0.3

vendor:freebsdmodel:10.1-release-p5scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified ip phonesscope:eqversion:69010

Trust: 0.3

vendor:ciscomodel:prime security managerscope:neversion:9.5.4.3

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.13-34

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.1.1

Trust: 0.3

vendor:ciscomodel:im and presence servicescope:neversion:11.5

Trust: 0.3

vendor:ciscomodel:ata analog telephone adaptorscope:neversion:1879.2.5

Trust: 0.3

vendor:ciscomodel:jabber guestscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ucs central 1.5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5(2)

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.1.1

Trust: 0.3

vendor:ibmmodel:real-time compression appliancescope:eqversion:4.1.2

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.4.0.1

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:eqversion:4.2.0.3

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:prime license managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime collaboration deploymentscope:neversion:11.5

Trust: 0.3

vendor:ciscomodel:series ip phones vpn featurescope:neversion:8800-11.5.2

Trust: 0.3

vendor:ibmmodel:mobile foundation consumer editionscope:eqversion:6.2.0.1

Trust: 0.3

vendor:ciscomodel:web security appliancescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3394

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.2

Trust: 0.3

vendor:ciscomodel:visual quality experience serverscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:filenet system monitorscope:eqversion:4.5

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1tscope:neversion: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for windowsscope:neversion:4.3

Trust: 0.3

vendor:ciscomodel:content security management appliancescope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p28scope: - version: -

Trust: 0.3

vendor:ciscomodel:agent for openflowscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.4.0

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.1

Trust: 0.3

vendor:ibmmodel:image construction and composition toolscope:eqversion:2.3.1.0

Trust: 0.3

vendor:ciscomodel:webex recording playback clientscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime collaboration assurancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asa next-generation firewall servicesscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:9.3-release-p38scope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence content serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:tandberg codian mse modelscope:eqversion:83200

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:eqversion:2.2.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.2

Trust: 0.3

vendor:freebsdmodel:9.3-release-p10scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p1scope: - version: -

Trust: 0.3

vendor:ciscomodel:digital media players seriesscope:eqversion:44000

Trust: 0.3

vendor:ciscomodel:mds series multilayer switchesscope:neversion:90008.3

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.16-37

Trust: 0.3

vendor:freebsdmodel:10.2-release-p13scope: - version: -

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.3.1nxscope:neversion:5000

Trust: 0.3

vendor:ibmmodel:service delivery managerscope:eqversion:7.2.1

Trust: 0.3

vendor:susemodel:opensuse evergreenscope:eqversion:11.4

Trust: 0.3

vendor:ciscomodel:prime infrastructure standalone plug and play gatewayscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:spa50x series ip phonesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex meetings for blackberryscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors interim fixscope:eqversion:4.014-01

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.0.3

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector sflowscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1gscope: - version: -

Trust: 0.3

vendor:ciscomodel:media experience enginesscope:neversion:3.5.1

Trust: 0.3

vendor:oraclemodel:exalogic infrastructurescope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors fp1scope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.4

Trust: 0.3

vendor:ciscomodel:telepresence integrator c seriesscope:neversion:7.3.7

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:neversion:4.2

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.5.1.1

Trust: 0.3

vendor:ibmmodel:workload deployerscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:telepresence serverscope:eqversion:87100

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.4-23

Trust: 0.3

vendor:freebsdmodel:10.2-release-p14scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p17scope: - version: -

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.25-57

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:eqversion:1.4.6.1146-109

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.18-43

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:neversion:4.1.0.5

Trust: 0.3

vendor:ibmmodel:workload deployer if12scope:neversion:3.1.0.7

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2.1

Trust: 0.3

vendor:ciscomodel:media services interfacescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus intercloudscope:eqversion:1000v0

Trust: 0.3

vendor:ciscomodel:media experience enginesscope:neversion:3.5

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.5.0.0

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:9.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.1

Trust: 0.3

vendor:ciscomodel:ipsscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1iscope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.4.2

Trust: 0.3

vendor:ciscomodel:unified workforce optimization quality management sr3 es5scope:neversion:11.0

Trust: 0.3

vendor:ibmmodel:qradarscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:meetingplacescope:neversion:2.7

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1.0.1

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.0.2

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:11.2

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.913

Trust: 0.3

vendor:ciscomodel:unified attendant console advancedscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:neversion:7.0.1.7

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for iosscope:neversion:4.0

Trust: 0.3

vendor:ciscomodel:webex messenger service ep1scope:eqversion:7.9.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.3

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:mediasensescope:neversion:11.5.1

Trust: 0.3

vendor:ciscomodel:unified ip phone 9.4.2sr3scope:neversion:8961

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.1.1

Trust: 0.3

vendor:freebsdmodel:10.2-release-p9scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified wireless ip phonescope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1sscope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p27scope: - version: -

Trust: 0.3

vendor:ciscomodel:spa122 ata with routerscope:neversion:1.4.5

Trust: 0.3

vendor:ciscomodel:media experience enginesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.4.6

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.0.2

Trust: 0.3

vendor:ciscomodel:webex meeting centerscope:neversion:3.9.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector netflowscope:neversion:6.8.2

Trust: 0.3

vendor:ciscomodel:webex node for mcsscope:neversion:3.12.9.8

Trust: 0.3

vendor:ciscomodel:jabber for androidscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:video surveillance 4300e/4500e high-definition ip camerasscope:neversion:3.2.8

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:6.3.0.0

Trust: 0.3

vendor:freebsdmodel:10.2-release-p6scope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interix fixscope:eqversion:4.2.0.3

Trust: 0.3

vendor:ciscomodel:unified sip proxyscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:virtual security gateway for microsoft hyper-vscope:neversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:tandberg codian isdn gwscope:eqversion:32100

Trust: 0.3

vendor:ciscomodel:unified attendant console premium editionscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:neversion:4300

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.11-28

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.1

Trust: 0.3

vendor:ibmmodel:qradarscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.31

Trust: 0.3

vendor:ciscomodel:prime optical for spsscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:neversion:2.2.1

Trust: 0.3

vendor:ibmmodel:abyp-2t-1s-1l-p-mscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mds series multilayer switchesscope:neversion:90006.2.17

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.19

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1rscope: - version: -

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for linuxscope:neversion:4.3

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.3

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:7.3.0.0

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.03

Trust: 0.3

vendor:ibmmodel:aspera consolescope:neversion:3.1.1

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.0.997

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for osscope:neversion:x4.3

Trust: 0.3

vendor:ciscomodel:unified ip phone seriesscope:eqversion:79000

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for androidscope:neversion:4.3

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowsensorscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.3.0.0

Trust: 0.3

vendor:ciscomodel:connected analytics for collaboration 1.0.1qscope:neversion: -

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.20

Trust: 0.3

vendor:ciscomodel:jabber guestscope:neversion:11.0

Trust: 0.3

vendor:ibmmodel:abyp-2t-1s-1l-pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5.2(2)

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector sflowscope:neversion:6.7.3

Trust: 0.3

vendor:ciscomodel:mmp serverscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.2

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for imagesscope:eqversion:7.1.1.19

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.30.0-13

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:abyp-10g-2sr-2lr-1-p-mscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images buildscope:eqversion:7.1.1.20280.6

Trust: 0.3

vendor:ciscomodel:computer telephony integration object serverscope:neversion:11.51

Trust: 0.3

vendor:ciscomodel:unified communications for microsoft lyncscope:neversion:10.6.7

Trust: 0.3

vendor:ciscomodel:prime security managerscope:eqversion:9.3.4.2-4

Trust: 0.3

vendor:ciscomodel:anyres livescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.0.0.14

Trust: 0.3

vendor:ciscomodel:ons series multiservice provisioning platformsscope:neversion:1545410.6.1

Trust: 0.3

vendor:ciscomodel:telepresence isdn linkscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence serverscope:neversion:70104.4

Trust: 0.3

vendor:ciscomodel:packet tracerscope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.7.0

Trust: 0.3

vendor:ibmmodel:openssh for gpfs for windowsscope:neversion:3.5.0.31

Trust: 0.3

vendor:ciscomodel:unified attendant console business editionscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:agent for openflowscope:neversion:2.0.7

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:eqversion:4.1.0.5

Trust: 0.3

vendor:ibmmodel:cognos business intelligence interim fixscope:neversion:10.2.117

Trust: 0.3

vendor:ciscomodel:unified contact center enterprisescope:neversion:11.51

Trust: 0.3

vendor:ciscomodel:tandberg codian isdn gwscope:eqversion:32200

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5.2(3)

Trust: 0.3

vendor:paloaltonetworksmodel:globalprotect agentscope:eqversion:3.1.0

Trust: 0.3

vendor:ciscomodel:webex meetings for wp8scope:neversion:3.0

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.54

Trust: 0.3

vendor:ibmmodel:abyp-2t-2s-0l-pscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:webex meetings for androidscope:neversion:9.1

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.5.0

Trust: 0.3

vendor:ciscomodel:mds series multilayer switches 7.3.1nxscope:neversion:9000

Trust: 0.3

vendor:ciscomodel:mds series multilayer switchesscope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:ios software and cisco ios xe softwarescope:neversion:16.3.1

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:3.1.0.2

Trust: 0.3

vendor:ciscomodel:webex meeting centerscope:neversion:3.9.0.5

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.15-36

Trust: 0.3

vendor:ciscomodel:ace application control engine modulescope:eqversion:300

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowsensorscope:neversion:6.7.3

Trust: 0.3

vendor:oraclemodel:exalogic infrastructurescope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:proventia network enterprise scannerscope:eqversion:2.3

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.4

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:neversion:5.1.1051.08

Trust: 0.3

vendor:ciscomodel:nac guest serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:eqversion:2.2.10

Trust: 0.3

vendor:ciscomodel:enterprise content delivery systemscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:10.5(1)

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2.11

Trust: 0.3

vendor:ibmmodel:mobile foundation consumer editionscope:eqversion:6.2.0.0

Trust: 0.3

vendor:ciscomodel:prime collaboration deploymentscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex meetings client hosted t31r1sp6scope:neversion: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fix1scope:eqversion:4.3.0.6

Trust: 0.3

vendor:freebsdmodel:9.3-release-p35scope: - version: -

Trust: 0.3

vendor:ciscomodel:dx series ip phonesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:virtualization experience media enginescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:neversion:60002.8

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:3x000

Trust: 0.3

vendor:ciscomodel:packet tracerscope:eqversion:5.3

Trust: 0.3

vendor:ciscomodel:unified sip proxyscope:neversion:10.0

Trust: 0.3

vendor:freebsdmodel:10.2-release-p10scope: - version: -

Trust: 0.3

vendor:ibmmodel:aspera sharesscope:eqversion:1.9.3

Trust: 0.3

vendor:ibmmodel:abyp-0t-4s-0l-pscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.0.0.1

Trust: 0.3

vendor:ciscomodel:spa50x series ip phonesscope:neversion:7.6.5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:ibmmodel:abyp-4ts-p-mscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:8.5

Trust: 0.3

vendor:ciscomodel:ata series analog terminal adaptorscope:neversion:1901.3

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:11.0

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:neversion:4400

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.4

Trust: 0.3

vendor:ciscomodel:virtualization experience media enginescope:neversion:11.5.1

Trust: 0.3

vendor:ibmmodel:abyp-10g-4lr-1-pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:eqversion:3200

Trust: 0.3

vendor:ibmmodel:abyp-10g-4lr-1-p-mscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:video surveillance ptz ip camerasscope:neversion:2.8

Trust: 0.3

vendor:freebsdmodel:9.3-release-p2scope: - version: -

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:8.6

Trust: 0.3

vendor:ciscomodel:unified communications for microsoft lyncscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber software development kitscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:spa122 ata with routerscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-stablescope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactions if03scope:eqversion:7.4.0.1

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.4

Trust: 0.3

vendor:ciscomodel:identity services enginescope:neversion:2.2.1

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:11.2

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:eqversion:5.1.151.05

Trust: 0.3

vendor:freebsdmodel:10.1-release-p9scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:neversion:2.7

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.3

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1.2.2

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.5(2.10000.5)

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1cscope: - version: -

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1.1.0

Trust: 0.3

vendor:ciscomodel:telepresence mx seriesscope:neversion:7.3.7

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:neversion:3204.4

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector sflowscope:neversion:6.8

Trust: 0.3

vendor:ibmmodel:qradar siem/qrif/qrm/qvm patchscope:neversion:7.2.71

Trust: 0.3

vendor:ciscomodel:digital media players series 5.3 rbscope:eqversion:4300

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.1768

Trust: 0.3

vendor:ciscomodel:telepresence profile seriesscope:neversion:7.3.7

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.41

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.0.1

Trust: 0.3

vendor:ibmmodel:openssh for gpfs for windowsscope:eqversion:3.5

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.11.6

Trust: 0.3

vendor:ibmmodel:abyp-0t-0s-4l-p-mscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.0.5

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1fscope: - version: -

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.3.1nxscope:neversion:7000

Trust: 0.3

vendor:ciscomodel:jabber for android mrscope:neversion:11.6

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2ascope: - version: -

Trust: 0.3

vendor:ibmmodel:abyp-4t-0s-0l-p-mscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:algo audit and compliancescope:eqversion:2.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2fscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.5

Trust: 0.3

vendor:ciscomodel:connected grid router-cgosscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:1.0.2919

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.0

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch smcscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for imagesscope:eqversion:7.1.1.0

Trust: 0.3

vendor:ciscomodel:telepresence server on virtual machine mr2scope:neversion:4.2

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:neversion:4.3

Trust: 0.3

vendor:ibmmodel:service delivery managerscope:eqversion:7.2.4

Trust: 0.3

vendor:ciscomodel:unified ip phonesscope:eqversion:69450

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:60008.3

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.30.2-9

Trust: 0.3

vendor:ibmmodel:abyp-0t-2s-2l-pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:70008.3

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.2

Trust: 0.3

vendor:ciscomodel:webex meetings server ssl gatewayscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:eqversion:1.4.6.1146-110

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.0.4

Trust: 0.3

vendor:ibmmodel:messagesightscope:eqversion:1.2

Trust: 0.3

vendor:ciscomodel:prime network services controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector sflowscope:neversion:6.8.1

Trust: 0.3

vendor:ciscomodel:ironport email security appliancescope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:9.3-release-p3scope: - version: -

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:neversion:11.2

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:eqversion:1.5.0.12

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:eqversion:1.4.6.1146-113

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowsensorscope:neversion:6.8

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.1.3

Trust: 0.3

vendor:ciscomodel:spa30x series ip phonesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.1.2

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.30-12

Trust: 0.3

vendor:ciscomodel:webex meetings client on premisesscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitorsscope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.3

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:7.1.1.19

Trust: 0.3

vendor:ciscomodel:telepresence serverscope:eqversion:70100

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.3(1)

Trust: 0.3

vendor:ciscomodel:hosted collaboration mediation fulfillmentscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:neversion:5.4

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:5.0.2

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:1.0.2

Trust: 0.3

vendor:ibmmodel:bm security identity governance and intelligencescope:eqversion:5.2.1

Trust: 0.3

vendor:ciscomodel:security managerscope:neversion:4.12

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:7.1.0.0

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.7

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.2.2

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.131)

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2dscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.3

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:onepk all-in-one vmscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:9.1(1)

Trust: 0.3

vendor:ciscomodel:prime lan management solutionscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:algo audit and compliance ifscope:neversion:2.1.0.32

Trust: 0.3

vendor:ciscomodel:spa525gscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:eqversion:4.3.0.4

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowsensorscope:neversion:6.8.1

Trust: 0.3

vendor:freebsdmodel:9.3-release-p25scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:7.0.0.0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:abyp-0t-2s-2l-p-mscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified attendant console department editionscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified ip phone 9.4.2sr3scope:neversion:9971

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.1

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.29-9

Trust: 0.3

vendor:ciscomodel:series ip phones vpn featurescope:eqversion:8800-0

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.3.1dxscope:neversion:6000

Trust: 0.3

vendor:ibmmodel:abyp-2t-0s-2l-pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:spa112 2-port phone adapterscope:neversion:1.4.5

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.2.0.6

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3387

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.2.1.1

Trust: 0.3

vendor:ciscomodel:telepresence server mr2scope:neversion:70104.2

Trust: 0.3

vendor:ciscomodel:webex messenger servicescope:neversion:7.20

Trust: 0.3

vendor:ibmmodel:abyp-10g-4sr-1-p-mscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:media experience enginesscope:neversion:3.2

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.0.0

Trust: 0.3

vendor:freebsdmodel:10.3-stablescope:neversion: -

Trust: 0.3

vendor:oraclemodel:commerce guided searchscope:eqversion:6.1.4

Trust: 0.3

vendor:oraclemodel:enterprise managerscope:eqversion:12.2.2

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.2

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.3.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:video distribution suite for internet streamingscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:connected grid router 15.6.2.15tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:eqversion:4300

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty media mr2scope:neversion:3204.2

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1.116

Trust: 0.3

vendor:ciscomodel:cloupia unified infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:hosted collaboration mediation fulfillmentscope:neversion:11.5:20

Trust: 0.3

vendor:ciscomodel:jabber for macscope:neversion:11.7

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.20

Trust: 0.3

vendor:ciscomodel:agent desktop for cisco unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:70000

Trust: 0.3

vendor:ibmmodel:counter fraud management for safer paymentsscope:eqversion:5.3.0

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty media mr2scope:neversion:3104.2

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:70006.2.17

Trust: 0.3

vendor:ciscomodel:digital media players series 5.3 rbscope:eqversion:4400

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.2.1.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1nscope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:eqversion:3204.1

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch smcscope:neversion:6.7.3

Trust: 0.3

vendor:ciscomodel:packet tracerscope:neversion:7.0

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:neversion:6.3.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1oscope: - version: -

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:unified wireless ip phonescope:neversion:1.5.1

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for windowsscope:neversion:4.0

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:neversion:8.0.1.4

Trust: 0.3

vendor:ciscomodel:virtual security gateway vsg2scope:neversion: -

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.1.0

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:ibmmodel:workload deployerscope:eqversion:3.17

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.1

Trust: 0.3

vendor:ciscomodel:policy suitescope:eqversion:0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:14.0

Trust: 0.3

vendor:ciscomodel:webex meetings client on premisesscope:neversion:-2.7

Trust: 0.3

vendor:freebsdmodel:10.2-release-p12scope: - version: -

Trust: 0.3

vendor:ciscomodel:spa51x series ip phonesscope:neversion:7.6.5

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.55

Trust: 0.3

vendor:ciscomodel:unified ip conference phone for third-party call controlscope:eqversion:88310

Trust: 0.3

vendor:ciscomodel:unified intelligence centerscope:neversion:11.5.1

Trust: 0.3

vendor:ciscomodel:telepresence server on virtual machinescope:neversion:4.4

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:7.9.0.0

Trust: 0.3

vendor:ciscomodel:common services platform collectorscope:neversion:1.9.1

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:8.7

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2escope: - version: -

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.0.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.5(3.10000.9)

Trust: 0.3

vendor:ciscomodel:hosted collaboration mediation fulfillmentscope:neversion:11.5

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1qscope: - version: -

Trust: 0.3

vendor:ciscomodel:dcm series 9900-digital content managerscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:9.3

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.16

Trust: 0.3

vendor:ciscomodel:digital media managerscope:neversion:5.3

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for iosscope:neversion:4.2

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.2.1.2

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.2.0.0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment intirim fixscope:eqversion:5.133

Trust: 0.3

vendor:ciscomodel:telepresence sx seriesscope:neversion:8.1.2

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector sflowscope:neversion:6.8.2

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for windowsscope:neversion:4.2

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2.2

Trust: 0.3

vendor:ciscomodel:webex meetings client hostedscope:eqversion:-0

Trust: 0.3

vendor:ciscomodel:webex meetings for wp8scope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.13

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:eqversion:1.4.6.1146-108

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unixscope:neversion:1.5.0.13

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:5.2(2.1)

Trust: 0.3

vendor:ciscomodel:webex meetings for wp8scope:neversion:2.6.1

Trust: 0.3

vendor:ciscomodel:physical access control gatewayscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:neversion:5.5.7

Trust: 0.3

vendor:freebsdmodel:9.3-release-p24scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex messenger servicescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security privileged identity managerscope:eqversion:2.0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p19scope: - version: -

Trust: 0.3

vendor:ciscomodel:mmp serverscope:neversion:3.10

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:3.1.0.1

Trust: 0.3

vendor:ciscomodel:prime ip expressscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:application and content networking systemscope:neversion:5.5.41

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.1.0

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:10.1-release-p30scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p13scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:3.1.2.1

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:intelligent automation for cloudscope:neversion:0.9.8

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.1.1

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:5.0.1

Trust: 0.3

vendor:ciscomodel:edge digital media player 1.6rb4 5scope:neversion:300

Trust: 0.3

vendor:ciscomodel:mds series multilayer switches 7.3.1dxscope:neversion:9000

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:99510

Trust: 0.3

vendor:ibmmodel:abyp-10g-4sr-1-pscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:9.3-release-p36scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:89450

Trust: 0.3

vendor:ciscomodel:digital media managerscope:neversion:5.4.1

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:eqversion:7.1.1.20280.6

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowsensorscope:neversion:6.8.2

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:neversion:30002.8

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:9.2

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.12

Trust: 0.3

vendor:ciscomodel:webex meeting centerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.11

Trust: 0.3

vendor:ciscomodel:partner supporting servicescope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.1.0.11

Trust: 0.3

vendor:ciscomodel:mobility services enginescope:neversion:8.0

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:neversion:3401.2.0.20

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:abyp-0t-4s-0l-p-mscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:spa30x series ip phonesscope:neversion:7.6.5

Trust: 0.3

vendor:ciscomodel:unified series ip phonesscope:eqversion:78000

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:neversion:7.2.0.8

Trust: 0.3

vendor:ciscomodel:digital media players series 5.4 rbscope:eqversion:4400

Trust: 0.3

vendor:freebsdmodel:10.2-release-p11scope: - version: -

Trust: 0.3

vendor:ibmmodel:service delivery managerscope:eqversion:7.2.2

Trust: 0.3

vendor:ibmmodel:enterprise content management system monitorscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:telepresence mcuscope:eqversion:42000

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:neversion:9.0.1.0

Trust: 0.3

vendor:ciscomodel:socialminerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:standalone rack server cimcscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.2.1

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.2.0.0

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.2.0.0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:spa112 2-port phone adapterscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors fp14scope:eqversion:4.0.0

Trust: 0.3

vendor:ciscomodel:intracerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch smcscope:neversion:6.8

Trust: 0.3

vendor:ciscomodel:jabber for apple iosscope:neversion:11.6.2

Trust: 0.3

vendor:ciscomodel:video surveillance series high-definition ip camerasscope:neversion:40002.4.7

Trust: 0.3

vendor:ciscomodel:video surveillance media serverscope:eqversion:7.7

Trust: 0.3

vendor:freebsdmodel:9.3-release-p33scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.5

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deployment buildscope:eqversion:5.1.1051.07

Trust: 0.3

vendor:ciscomodel:telepresence mcuscope:eqversion:84200

Trust: 0.3

vendor:ciscomodel:jabber for windowsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ironport email security appliancescope:neversion:10.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.2

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for linuxscope:neversion:4.0

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.112

Trust: 0.3

vendor:ciscomodel:meetingplacescope: - version: -

Trust: 0.3

vendor:ciscomodel:spa525gscope:neversion:7.6.5

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.2.0.3

Trust: 0.3

vendor:ciscomodel:mmp serverscope:neversion:3.9.0.5

Trust: 0.3

vendor:freebsdmodel:9.3-release-p41scope:neversion: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors fp1scope:eqversion:4.0.1

Trust: 0.3

vendor:ciscomodel:telepresence integrator c seriesscope:neversion:8.1.2

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch udp directorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime network registrarscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:cloud object storescope:neversion:3.8

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for androidscope:neversion:4.0

Trust: 0.3

vendor:ibmmodel:cognos business intelligence fixpackscope:eqversion:10.2.12

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:6.1.4

Trust: 0.3

vendor:ciscomodel:telepresence sx seriesscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p25scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:enterprise content management system monitorscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.1.5

Trust: 0.3

vendor:ciscomodel:registered envelope servicescope:neversion:5.0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.1.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.4

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch smcscope:neversion:6.8.1

Trust: 0.3

vendor:ibmmodel:mq appliance m2001scope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors fp2scope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.2.1

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:99710

Trust: 0.3

vendor:ciscomodel:telepresence content serverscope:neversion:7.2

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:8.5(4)

Trust: 0.3

vendor:ciscomodel:meetingplacescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:neversion:3104.4

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.1.4

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1.0.2

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for linuxscope:neversion:4.2

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.3.0.6

Trust: 0.3

vendor:ciscomodel:ata analog telephone adaptorscope:eqversion:1870

Trust: 0.3

vendor:ciscomodel:asa cx and prime security managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:universal small cell seriesscope:neversion:50003.5.12.21

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1mscope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for androidscope:neversion:4.2

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:10.0(1)

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:50007.3.1

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:8.5(3)

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.3.0

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.1.0.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p6scope: - version: -

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.1.0

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1.0.2

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:unified ip phone 9.4.2sr3scope:neversion:8945

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.18-49

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.0(1.10000.12)

Trust: 0.3

vendor:ibmmodel:mq appliance m2000scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence ex seriesscope:neversion:8.1.2

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:1000v0

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:3.1.3

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.2.3

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.6

Trust: 0.3

vendor:ciscomodel:mate designscope:eqversion:0

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:1.0.1

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:9.0.0.1

Trust: 0.3

vendor:ibmmodel:rational insightscope:eqversion:1.1.1.5

Trust: 0.3

vendor:freebsdmodel:10.3-rc2scope: - version: -

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.13-41

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:14.0

Trust: 0.3

vendor:ciscomodel:show and sharescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:network admission controlscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified communications for microsoft lyncscope:neversion:11.6

Trust: 0.3

vendor:ciscomodel:identity services enginescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.4

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1jscope: - version: -

Trust: 0.3

vendor:ciscomodel:universal small cell seriesscope:eqversion:70003.4.2.0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p33scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.3.1dxscope:neversion:5000

Trust: 0.3

vendor:ciscomodel:telepresence conductorscope:neversion:4.3

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:abyp-0t-0s-4l-pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified attendant console standardscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.115

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactionsscope:eqversion:7.4.0.0

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.1.1

Trust: 0.3

vendor:ibmmodel:jazz reporting servicescope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:connected grid routersscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mate livescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.13

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.6)

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:telepresence integrator c seriesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified workforce optimization sr3 es5scope:neversion:11.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1dscope: - version: -

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.0.1.2

Trust: 0.3

vendor:ciscomodel:unified communications manager 10.5 su3scope: - version: -

Trust: 0.3

vendor:ibmmodel:jazz reporting servicescope:eqversion:5.0.2

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:aspera sharesscope:eqversion:1.9.4

Trust: 0.3

vendor:ibmmodel:abyp-2t-2s-0l-p-mscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:abyp-4tl-p-mscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nac serverscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch udp directorscope:neversion:6.7.3

Trust: 0.3

vendor:ciscomodel:application policy infrastructure controllerscope:neversion:2.0(0.400)

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3381

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.9-34

Trust: 0.3

vendor:oraclemodel:enterprise managerscope:eqversion:12.3.2

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.3

Trust: 0.3

vendor:ibmmodel:abyp-4ts-pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media players seriesscope:eqversion:43000

Trust: 0.3

vendor:ibmmodel:workload deployerscope:eqversion:3.11

Trust: 0.3

vendor:ibmmodel:service delivery managerscope:eqversion:7.2.3

Trust: 0.3

vendor:freebsdmodel:9.3-release-p31scope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:eqversion:3100

Trust: 0.3

vendor:ibmmodel:security proventia network active bypass 0343c3cscope: - version: -

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fix1scope:neversion:4.3.0.6

Trust: 0.3

vendor:ciscomodel:unified ip phones 9.3 sr3scope:neversion:6901

Trust: 0.3

vendor:ciscomodel:digital media managerscope:neversion:5.3.6

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.1.3

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:11.0(0.98000.225)

Trust: 0.3

vendor:ciscomodel:prime networkscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for iosscope:neversion:4.3

Trust: 0.3

vendor:ciscomodel:prime performance managerscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:security access manager for webscope:eqversion:8.02

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:network analysis modulescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:websphere application server liberty profilescope:eqversion:8.5.5

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.4

Trust: 0.3

vendor:ciscomodel:unity connectionscope:neversion:11.5

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:neversion:8.8

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector netflowscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch smcscope:neversion:6.8.2

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.5(1.98991.13)

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1.2.0

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:ibmmodel:abyp-10g-2sr-2lr-1-pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:prime optical for spsscope:neversion:10.6

Trust: 0.3

vendor:ciscomodel:telepresence mcuscope:eqversion:45000

Trust: 0.3

vendor:ciscomodel:telepresence serverscope:neversion:87104.4

Trust: 0.3

vendor:ibmmodel:power hmcscope:eqversion:8.1.0.0

Trust: 0.3

vendor:ciscomodel:telepresence isdn gwscope:eqversion:32410

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.4

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:50008.3

Trust: 0.3

vendor:freebsdmodel:10.1-release-p31scope: - version: -

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors interim fixscope:eqversion:4.0.12-04

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1.2.1

Trust: 0.3

vendor:ciscomodel:netflow generation appliancescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:neversion:2.1.2.3

Trust: 0.3

vendor:ibmmodel:aspera sharesscope:eqversion:1.9.2

Trust: 0.3

vendor:ciscomodel:telepresence server on multiparty mediascope:eqversion:3104.1

Trust: 0.3

vendor:ciscomodel:telepresence ex seriesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:webex meetings server ssl gatewayscope:neversion:-2.7

Trust: 0.3

vendor:ciscomodel:telepresence server on virtual machinescope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:7.6

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.1.0.5

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:7.5

Trust: 0.3

vendor:ciscomodel:webex meetings for androidscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:emergency responderscope:eqversion:10.5(1.10000.5)

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.6

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for transactions if37scope:eqversion:7.3.0.1

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.6

Trust: 0.3

vendor:ibmmodel:tivoli network manager ip edition fix packscope:eqversion:3.94

Trust: 0.3

vendor:ciscomodel:prime license managerscope:neversion:11.5

Trust: 0.3

vendor:oraclemodel:commerce experience managerscope:eqversion:11.0

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3376

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:messagesightscope:eqversion:1.1

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:5.1.3

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:2.18-42

Trust: 0.3

vendor:ciscomodel:video surveillance series ip camerasscope:neversion:70002.8

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:neversion:8.8

Trust: 0.3

vendor:ibmmodel:abyp-4t-0s-0l-pscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:10.5

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.2

Trust: 0.3

vendor:ciscomodel:virtual security gateway for microsoft hyper-v vsg2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:connected grid router cgos 15.6.2.15tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:neversion:6.2.3

Trust: 0.3

vendor:freebsdmodel:9.3-release-p5scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors interim fixscope:eqversion:4.0.12-01

Trust: 0.3

vendor:ciscomodel:unified intelligent contact management enterprisescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.0.1

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.3.1nxscope:neversion:6000

Trust: 0.3

vendor:ciscomodel:application and content networking systemscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:mmp serverscope:neversion:3.9.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1kscope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p39scope: - version: -

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for iosscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:sterling connect:express for unix ifixscope:neversion:1.4.6.1146-114

Trust: 0.3

vendor:ciscomodel:telepresence mx seriesscope:neversion:8.1.2

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.5

Trust: 0.3

vendor:ciscomodel:spa232d multi-line dect atascope:neversion:1.4.5

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images buildscope:neversion:7.1.1.20290.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1bscope: - version: -

Trust: 0.3

vendor:ciscomodel:telepresence profile seriesscope:neversion:8.1.2

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.0.0.13

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for osscope:neversion:x4.2

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitors interim fixscope:eqversion:4.014-08

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch udp directorscope:neversion:6.8

Trust: 0.3

vendor:ciscomodel:universal small cell seriesscope:neversion:70003.5.12.21

Trust: 0.3

vendor:ciscomodel:telepresence conductorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:application policy infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber for macscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:globalprotect agentscope:neversion:3.1.1

Trust: 0.3

vendor:ciscomodel:dcm series 9900-digital content managerscope:neversion:19.0

Trust: 0.3

vendor:ibmmodel:image construction and composition toolscope:eqversion:2.3.2.0

Trust: 0.3

vendor:freebsdmodel:10.3-release-p1scope: - version: -

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0.1

Trust: 0.3

vendor:ibmmodel:security access managerscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:video surveillance 4300e/4500e high-definition ip camerasscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:1.0.1876

Trust: 0.3

vendor:ciscomodel:mediasensescope:eqversion:9.0

Trust: 0.3

vendor:freebsdmodel:10.3-release-p2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:unified ip phone 9.4.2sr3scope:neversion:9951

Trust: 0.3

vendor:ciscomodel:local collector appliancescope:neversion:2.2.12

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:worklight enterprise editionscope:eqversion:6.1.0.1

Trust: 0.3

vendor:ibmmodel:websphere cast iron cloud integrationscope:eqversion:6.32

Trust: 0.3

vendor:ibmmodel:pureapplication systemscope:eqversion:2.1.0.0

Trust: 0.3

vendor:ciscomodel:content security appliance updater serversscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p29scope: - version: -

Trust: 0.3

vendor:ciscomodel:connected analytics for collaborationscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:multicast managerscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:10.1-release-p23scope: - version: -

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch flowcollector netflowscope:neversion:6.7.3

Trust: 0.3

vendor:ibmmodel:cognos business intelligence serverscope:eqversion:10.2

Trust: 0.3

vendor:ciscomodel:telepresence ex seriesscope:neversion:7.3.7

Trust: 0.3

vendor:applemodel:mac os security updatescope:neversion:x2016

Trust: 0.3

vendor:freebsdmodel:10.1-release-p16scope: - version: -

Trust: 0.3

vendor:ibmmodel:jazz reporting servicescope:eqversion:5.0.1

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:50006.2.17

Trust: 0.3

vendor:ibmmodel:security proventia network active bypassscope:eqversion:3.30.4-12

Trust: 0.3

vendor:ciscomodel:webex node for mcsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:emergency responder 10.5scope: - version: -

Trust: 0.3

vendor:ibmmodel:security identity manager virtual appliancescope:eqversion:7.0.0.0

Trust: 0.3

vendor:ibmmodel:qradar siem mr2 patchscope:neversion:7.113

Trust: 0.3

vendor:ciscomodel:unified communications manager session management editionscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexusscope:neversion:900012.0

Trust: 0.3

vendor:ciscomodel:lancope stealthwatch udp directorscope:neversion:6.8.1

Trust: 0.3

vendor:freebsdmodel:9.3-release-p6scope: - version: -

Trust: 0.3

vendor:ciscomodel:video surveillance ptz ip camerasscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:virtualization experience media enginescope:neversion:11.7(0)

Trust: 0.3

vendor:ciscomodel:telepresence serial gateway seriesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:iscope:eqversion:7.2

Trust: 0.3

vendor:freebsdmodel:9.3-release-p9scope: - version: -

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.3

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2cscope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.5mr2scope: - version: -

Trust: 0.3

vendor:ciscomodel:virtual security gateway for microsoft hyper-vscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:services analytic platformscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber for apple iosscope:neversion:11.7

Trust: 0.3

vendor:ciscomodel:unified ip phone seriesscope:eqversion:79009.4(2)

Trust: 0.3

vendor:ciscomodel:unified ip phonescope:eqversion:89610

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:60006.2.17

Trust: 0.3

vendor:ibmmodel:workload deployerscope:eqversion:3.12

Trust: 0.3

vendor:ibmmodel:tivoli netcool system service monitorsscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:3.1.2

Trust: 0.3

vendor:ciscomodel:unified series ip conference phonescope:eqversion:88310

Trust: 0.3

vendor:ciscomodel:video surveillance media serverscope:neversion:7.9

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:neversion:11.5

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:agent for openflowscope:neversion:2.1.5

Trust: 0.3

vendor:freebsdmodel:10.2-release-p16scope:neversion: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2hscope:neversion: -

Trust: 0.3

vendor:ciscomodel:virtual security gatewayscope:neversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:unified attendant console enterprise editionscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:security network controllerscope:eqversion:1.0.3379

Trust: 0.3

vendor:ciscomodel:policy suitescope:neversion:10.0

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for os deploymentscope:eqversion:7.1.1

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.2

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:prime data center network managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified computing systemscope:eqversion: -

Trust: 0.3

vendor:ciscomodel:unified communications manager session management editionscope:neversion:11.5

Trust: 0.3

vendor:ciscomodel:videoscape control suitescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:telepresence mcuscope:eqversion:53000

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:neversion:7.1

Trust: 0.3

vendor:ciscomodel:anyres livescope:neversion:9.4.5

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:1.3.3.0

Trust: 0.3

vendor:ibmmodel:security access manager for mobilescope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:mobilefirst platform foundationscope:eqversion:7.0.0.0

Trust: 0.3

vendor:freebsdmodel:9.3-release-p34scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.0(1)

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images system edition buildscope:neversion:x7.1.1.20290.1

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.1.0.10

Trust: 0.3

vendor:ciscomodel:jabber software development kitscope:neversion:11.7

Trust: 0.3

vendor:ciscomodel:unified contact center expressscope:neversion:11.5.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:webex meetings server mr1scope:eqversion:2.5

Trust: 0.3

vendor:ibmmodel:systems directorscope:eqversion:6.3.0.0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.99.2

Trust: 0.3

vendor:ciscomodel:telepresence mx seriesscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational reporting for development intelligencescope:eqversion:2.0.1

Trust: 0.3

vendor:ibmmodel:jazz reporting servicescope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:telepresence isdn gw msescope:eqversion:83210

Trust: 0.3

vendor:ciscomodel:telepresence profile seriesscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:abyp-2t-0s-2l-p-mscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:visual quality experience tools serverscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:cloud manager with openstack interim fixscope:neversion:4.2.0.3

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:neversion:7.2

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.3.1dxscope:neversion:7000

Trust: 0.3

vendor:ciscomodel:asa cx and cisco prime security managerscope:neversion:9.5.4.3

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1lscope: - version: -

Trust: 0.3

vendor:ciscomodel:im and presence servicescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:digital media managerscope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:9.3-release-p29scope: - version: -

Trust: 0.3

vendor:ciscomodel:firesight system softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:management appliancescope:eqversion:0

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.2

Trust: 0.3

vendor:ibmmodel:aspera consolescope:eqversion:3.0.2

Trust: 0.3

vendor:ibmmodel:tivoli provisioning manager for images system editionscope:eqversion:x7.1.1.0

Trust: 0.3

vendor:ciscomodel:unity connectionscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:datapower gatewaysscope:eqversion:7.5.0.1

Trust: 0.3

vendor:ciscomodel:cloud object storescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility client for osscope:neversion:x4.0

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1hscope: - version: -

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.5(2.13900.9)

Trust: 0.3

vendor:ciscomodel:ip interoperability and collaboration systemscope:neversion:5.0

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.5(0.98000.88)

Trust: 0.3

vendor:ibmmodel:cloud manager with openstackscope:eqversion:4.2.0.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.1pscope: - version: -

Trust: 0.3

sources: BID: 87940 // JVNDB: JVNDB-2016-002476 // CNNVD: CNNVD-201605-083 // NVD: CVE-2016-2109

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2109
value: HIGH

Trust: 1.0

NVD: CVE-2016-2109
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201605-083
value: HIGH

Trust: 0.6

VULMON: CVE-2016-2109
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-2109
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2016-2109
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULMON: CVE-2016-2109 // JVNDB: JVNDB-2016-002476 // CNNVD: CNNVD-201605-083 // NVD: CVE-2016-2109

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.8

sources: JVNDB: JVNDB-2016-002476 // NVD: CVE-2016-2109

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 136895 // CNNVD: CNNVD-201605-083

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201605-083

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002476

PATCH

title:APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004url:http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html

Trust: 0.8

title:HT206903url:https://support.apple.com/en-us/HT206903

Trust: 0.8

title:HT206903url:https://support.apple.com/ja-jp/HT206903

Trust: 0.8

title:HPSBMU03691url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

Trust: 0.8

title:SB10160url:https://kc.mcafee.com/corporate/index?page=content&id=SB10160

Trust: 0.8

title:NV16-015url:http://jpn.nec.com/security-info/secinfo/nv16-015.html

Trust: 0.8

title:Major changes between OpenSSL 1.0.1s and OpenSSL 1.0.1t [3 May 2016]url:https://www.openssl.org/news/openssl-1.0.1-notes.html

Trust: 0.8

title:Major changes between OpenSSL 1.0.2g and OpenSSL 1.0.2h [3 May 2016]url:https://www.openssl.org/news/openssl-1.0.2-notes.html

Trust: 0.8

title:Harden ASN.1 BIO handling of large amounts of data.url:https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807

Trust: 0.8

title:ASN.1 BIO excessive memory allocation (CVE-2016-2109)url:https://www.openssl.org/news/secadv/20160503.txt

Trust: 0.8

title:Oracle Critical Patch Update Advisory - October 2016url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 0.8

title:Oracle Critical Patch Update Advisory - July 2016url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 0.8

title:Oracle Linux Bulletin - July 2016url:http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

Trust: 0.8

title:Oracle Linux Bulletin - April 2016url:http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

Trust: 0.8

title:Oracle Solaris Third Party Bulletin - April 2016url:http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Trust: 0.8

title:Oracle VM Server for x86 Bulletin - July 2016url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 0.8

title:RHSA-2016:0722url:http://rhn.redhat.com/errata/RHSA-2016-0722.html

Trust: 0.8

title:RHSA-2016:0996url:http://rhn.redhat.com/errata/RHSA-2016-0996.html

Trust: 0.8

title:SA40202url:https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202

Trust: 0.8

title:JSA10759url:http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759

Trust: 0.8

title:TLSA-2016-14url:http://www.turbolinux.co.jp/security/2016/TLSA-2016-14j.html

Trust: 0.8

title:HS16-023url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS16-023/index.html

Trust: 0.8

title:OpenSSL ASN.1 BIO Fixes to implement a denial of service vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=61408

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2016/05/03/openssl_patches/

Trust: 0.2

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162073 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2016-2109url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2016-2109

Trust: 0.1

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2959-1

Trust: 0.1

title:Debian Security Advisories: DSA-3566-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=055972eb84483959232c972f757685e0

Trust: 0.1

title:Amazon Linux AMI: ALAS-2016-695url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-695

Trust: 0.1

title:Tenable Security Advisories: [R5] OpenSSL '20160503' Advisory Affects Tenable Productsurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-10

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Releaseurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162957 - Security Advisory

Trust: 0.1

title:IBM: IBM Security Bulletin: Fabric OS firmware for Brocade 8Gb SAN Switch Module for BladeCenter is affected by vulnerabilities in OpenSSL and OpenSSHurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b7f5b1e7edcafce07f28205855d4db49

Trust: 0.1

title:Tenable Security Advisories: [R3] PVS 5.1.0 Fixes Multiple Third-party Library Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-13

Trust: 0.1

title:Symantec Security Advisories: SA123 : OpenSSL Vulnerabilities 3-May-2016url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=5d65f6765e60e5fe9e6998a5bde1aadc

Trust: 0.1

title:Forcepoint Security Advisories: CVE-2016-2105, 2106, 2107, 2108, 2109, 2176 -- Security Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=01fd01e3d154696ffabfde89f4142310

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=83bbd91f8369c8f064e6d68dac68400f

Trust: 0.1

title:Android Security Bulletins: Android Security Bulletin—July 2017url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=8c840629bfabaea20b649ca3c4988587

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=976a4da35d55283870dbb31b88a6c655

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=0bd8c924b56aac98dda0f5b45f425f38

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=143b3fb255063c81571469eaa3cf0a87

Trust: 0.1

title:Tenable Security Advisories: [R7] LCE 4.8.1 Fixes Multiple Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-18

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=6c15273f6bf4a785175f27073b98a1ce

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=05aabe19d38058b7814ef5514aab4c0c

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=2f446a7e1ea263c0c3a365776c6713f2

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=5f8c525f1408011628af1792207b2099

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2016-2109

Trust: 0.1

title:alpine-cvecheckurl:https://github.com/tomwillfixit/alpine-cvecheck

Trust: 0.1

title: - url:https://github.com/imhunterand/hackerone-publicy-disclosed

Trust: 0.1

title:satellite-host-cveurl:https://github.com/RedHatSatellite/satellite-host-cve

Trust: 0.1

sources: VULMON: CVE-2016-2109 // JVNDB: JVNDB-2016-002476 // CNNVD: CNNVD-201605-083

EXTERNAL IDS

db:NVDid:CVE-2016-2109

Trust: 3.5

db:BIDid:87940

Trust: 2.0

db:BIDid:91787

Trust: 1.7

db:MCAFEEid:SB10160

Trust: 1.7

db:TENABLEid:TNS-2016-18

Trust: 1.7

db:PULSESECUREid:SA40202

Trust: 1.7

db:SIEMENSid:SSA-412672

Trust: 1.7

db:SECTRACKid:1035721

Trust: 1.7

db:PACKETSTORMid:136912

Trust: 1.7

db:JUNIPERid:JSA10759

Trust: 1.7

db:JVNid:JVNVU93163809

Trust: 0.8

db:JVNid:JVNVU94844193

Trust: 0.8

db:JVNDBid:JVNDB-2016-002476

Trust: 0.8

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:AUSCERTid:ESB-2019.2148

Trust: 0.6

db:CNNVDid:CNNVD-201605-083

Trust: 0.6

db:ICS CERTid:ICSA-22-349-21

Trust: 0.1

db:VULMONid:CVE-2016-2109

Trust: 0.1

db:PACKETSTORMid:136958

Trust: 0.1

db:PACKETSTORMid:136895

Trust: 0.1

db:PACKETSTORMid:136893

Trust: 0.1

db:PACKETSTORMid:139114

Trust: 0.1

db:PACKETSTORMid:139379

Trust: 0.1

db:PACKETSTORMid:143513

Trust: 0.1

db:PACKETSTORMid:169652

Trust: 0.1

sources: VULMON: CVE-2016-2109 // BID: 87940 // JVNDB: JVNDB-2016-002476 // PACKETSTORM: 136958 // PACKETSTORM: 136895 // PACKETSTORM: 136893 // PACKETSTORM: 139114 // PACKETSTORM: 139379 // PACKETSTORM: 143513 // PACKETSTORM: 169652 // CNNVD: CNNVD-201605-083 // NVD: CVE-2016-2109

REFERENCES

url:https://www.openssl.org/news/secadv/20160503.txt

Trust: 2.2

url:http://rhn.redhat.com/errata/rhsa-2016-0722.html

Trust: 2.0

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 2.0

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 2.0

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

Trust: 2.0

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 2.0

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160504-openssl

Trust: 2.0

url:http://rhn.redhat.com/errata/rhsa-2016-0996.html

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-2959-1

Trust: 1.8

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40202

Trust: 1.7

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10160

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2016/jul/msg00000.html

Trust: 1.7

url:https://support.apple.com/ht206903

Trust: 1.7

url:http://www.securityfocus.com/bid/91787

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05320149

Trust: 1.7

url:http://www.securityfocus.com/bid/87940

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html

Trust: 1.7

url:https://www.freebsd.org/security/advisories/freebsd-sa-16:17.openssl.asc

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2073.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2056.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-2957.html

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20160504-0001/

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Trust: 1.7

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03765en_us

Trust: 1.7

url:https://source.android.com/security/bulletin/2017-07-01

Trust: 1.7

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03756en_us

Trust: 1.7

url:https://www.tenable.com/security/tns-2016-18

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390722

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10759

Trust: 1.7

url:https://security.gentoo.org/glsa/201612-16

Trust: 1.7

url:http://packetstormsecurity.com/files/136912/slackware-security-advisory-openssl-updates.html

Trust: 1.7

url:https://bto.bluecoat.com/security-advisory/sa123

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html

Trust: 1.7

url:http://www.debian.org/security/2016/dsa-3566

Trust: 1.7

url:http://www.securitytracker.com/id/1035721

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html

Trust: 1.7

url:http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.7

url:https://git.openssl.org/?p=openssl.git%3ba=commit%3bh=c62981390d6cf9e3d612c489b8b77c2913b25807

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2109

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93163809/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94844193/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2109

Trust: 0.8

url:http://www.aratana.jp/security/detail.php?id=16

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-2109

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2016-2106

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2016-2105

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2016-2107

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2016-2108

Trust: 0.6

url:https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10887855

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2148/

Trust: 0.6

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05320149

Trust: 0.4

url:https://bugzilla.redhat.com/show_bug.cgi?id=1330101

Trust: 0.3

url:https://git.openssl.org/?p=openssl.git;a=commitdiff;h=c62981390d6cf9e3d612c489b8b77c2913b25807

Trust: 0.3

url:http://openssl.org/

Trust: 0.3

url:http://seclists.org/bugtraq/2016/may/25

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1023779

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1023814

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1024078

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1024319

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1024507

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg2c1000158

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1021361

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1021376

Trust: 0.3

url:https://securityadvisories.paloaltonetworks.com/home/detail/56?aspxautodetectcookiesupport=1

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21987903

Trust: 0.3

url:https://support.asperasoft.com/hc/en-us/articles/229505687-security-bulletin-multiple-openssl-vulnerabilities-affect-ibm-aspera-shares-1-9-2-or-earlier-%20-ibm-aspera-console-3-0-6-or-earlier

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1024066

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21988007

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=ssg1s1009147

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21983158

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21984323

Trust: 0.3

url:https://www-01.ibm.com/support/docview.wss?uid=swg21984483

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21984583

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21984609

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21984794

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21984920

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21984977

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21985736

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986068

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986123

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986152

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986260

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986473

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986506

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986563

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986564

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21986669

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21987671

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21987779

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21987968

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21988055

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21988071

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21988189

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21988350

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21988383

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21988976

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21989046

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21992493

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg2c1000192

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/openssl_advisory20.asc

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-2176

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-2109

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-2106

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-2105

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-2108

Trust: 0.2

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.2

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.2

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.2

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2016-2109

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2016:2073

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2959-1/

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=49332

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-2107

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0799

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-2842

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-0799

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2842

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.2d-0ubuntu1.5

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.36

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://access.redhat.com/articles/2688611

Trust: 0.1

url:https://access.redhat.com/solutions/222023

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2016-2054.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4459

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-4000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3183

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3110

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4459

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3195

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3183

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/jboss_enterprise_application_platform/6.4/index.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3110

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=6.4

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5387

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4393

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4396

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4537

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3739

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4395

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4538

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5385

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4070

Trust: 0.1

url:https://www.hpe.com/us/en/product-catalog/detail/pip.344313.html>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4072

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4071

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4343

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4543

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4394

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4539

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5388

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4342

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03765en_us

Trust: 0.1

url:http://h20565.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-a00006123en_

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0169

Trust: 0.1

url:https://www.openssl.org/policies/secpolicy.html

Trust: 0.1

url:https://www.openssl.org/policies/releasestrat.html),

Trust: 0.1

sources: VULMON: CVE-2016-2109 // BID: 87940 // JVNDB: JVNDB-2016-002476 // PACKETSTORM: 136958 // PACKETSTORM: 136895 // PACKETSTORM: 136893 // PACKETSTORM: 139114 // PACKETSTORM: 139379 // PACKETSTORM: 143513 // PACKETSTORM: 169652 // CNNVD: CNNVD-201605-083 // NVD: CVE-2016-2109

CREDITS

Brian Carpenter

Trust: 0.9

sources: BID: 87940 // CNNVD: CNNVD-201605-083

SOURCES

db:VULMONid:CVE-2016-2109
db:BIDid:87940
db:JVNDBid:JVNDB-2016-002476
db:PACKETSTORMid:136958
db:PACKETSTORMid:136895
db:PACKETSTORMid:136893
db:PACKETSTORMid:139114
db:PACKETSTORMid:139379
db:PACKETSTORMid:143513
db:PACKETSTORMid:169652
db:CNNVDid:CNNVD-201605-083
db:NVDid:CVE-2016-2109

LAST UPDATE DATE

2024-11-07T21:31:20.327000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2016-2109date:2023-11-07T00:00:00
db:BIDid:87940date:2017-05-02T01:10:00
db:JVNDBid:JVNDB-2016-002476date:2017-10-03T00:00:00
db:CNNVDid:CNNVD-201605-083date:2022-12-14T00:00:00
db:NVDid:CVE-2016-2109date:2023-11-07T02:30:56.300

SOURCES RELEASE DATE

db:VULMONid:CVE-2016-2109date:2016-05-05T00:00:00
db:BIDid:87940date:2016-04-26T00:00:00
db:JVNDBid:JVNDB-2016-002476date:2016-05-10T00:00:00
db:PACKETSTORMid:136958date:2016-05-10T17:01:56
db:PACKETSTORMid:136895date:2016-05-03T22:56:05
db:PACKETSTORMid:136893date:2016-05-03T22:55:47
db:PACKETSTORMid:139114date:2016-10-12T20:16:45
db:PACKETSTORMid:139379date:2016-10-27T19:22:00
db:PACKETSTORMid:143513date:2017-07-26T17:44:00
db:PACKETSTORMid:169652date:2016-05-03T12:12:12
db:CNNVDid:CNNVD-201605-083date:2016-05-04T00:00:00
db:NVDid:CVE-2016-2109date:2016-05-05T01:59:05.357