Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2005-0488
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:54.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "RHSA-2005:504", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-504.html" }, { "name": "1014203", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014203" }, { "name": "13940", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13940" }, { "name": "57755", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21253" }, { "name": "VU#800829", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/800829" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "RHSA-2005:562", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-562.html" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:11373", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373" }, { "name": "101665", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "oval:org.mitre.oval:def:1139", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139" }, { "name": "20050614 Multiple Vendor Telnet Client Information Disclosure Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities" }, { "name": "17135", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17135" }, { "name": "57761", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "101671", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "SUSE-SR:2005:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "RHSA-2005:504", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-504.html" }, { "name": "1014203", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014203" }, { "name": "13940", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13940" }, { "name": "57755", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21253" }, { "name": "VU#800829", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/800829" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "RHSA-2005:562", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-562.html" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:11373", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373" }, { "name": "101665", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "oval:org.mitre.oval:def:1139", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139" }, { "name": "20050614 Multiple Vendor Telnet Client Information Disclosure Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities" }, { "name": "17135", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17135" }, { "name": "57761", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "101671", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "SUSE-SR:2005:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "RHSA-2005:504", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-504.html" }, { "name": "1014203", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014203" }, { "name": "13940", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13940" }, { "name": "57755", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "VU#800829", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/800829" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "RHSA-2005:562", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-562.html" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:11373", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373" }, { "name": "101665", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "oval:org.mitre.oval:def:1139", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139" }, { "name": "20050614 Multiple Vendor Telnet Client Information Disclosure Vulnerability", "refsource": "IDEFENSE", "url": "http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities" }, { "name": "17135", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17135" }, { "name": "57761", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "101671", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "SUSE-SR:2005:016", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0488", "datePublished": "2005-06-14T04:00:00", "dateReserved": "2005-02-20T00:00:00", "dateUpdated": "2024-08-07T21:13:54.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-0488\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-06-14T04:00:00.000\",\"lastModified\":\"2024-11-20T23:55:14.960\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76385A91-A9A9-49F8-BB10-1214C387C12F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED81A044-8A7B-4EEF-A4B3-EA49D76FAAED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1E585DC-FC74-4BB0-96B7-C00B6DB610DF\"}]}]}],\"references\":[{\"url\":\"http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/17135\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21253\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1014203\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/800829\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_16_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-504.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-562.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/13940\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19289\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-214A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3101\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1014203\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/800829\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_16_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-504.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-562.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/13940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-214A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}]}}" } }
var-200506-0133
Vulnerability from variot
Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command. Included with many products Telnet Clients NEW-ENVIRON By command Telnet There is a problem that the environment variable information is illegally taken because the restriction of the environment variable sent to the server is inappropriate.By a third party IFRAME Tag and "TELNET://" Formal URI Etc., Web Malicious via page or email Telnet By enticing a target user to connect to a server, they may be able to obtain important information about the target system, such as the user's name, search path for executables, and locations of important data. still, Microsoft Windows 2000 Is not affected by this issue, Microsoft Windows Services for UNIX If you are using, you may be affected by this issue. Also some Linux Included with the distribution Kerberos Has been reported to be affected by this issue. Telnet clients provided by multiple vendors are prone to a remote information-disclosure vulnerability. Attackers can retrieve any information stored in the environment of clients using the affected telnet application.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Microsoft Telnet Client Information Disclosure Weakness
SECUNIA ADVISORY ID: SA15690
VERIFY ADVISORY: http://secunia.com/advisories/15690/
CRITICAL: Not critical
IMPACT: Exposure of system information
WHERE:
From remote
OPERATING SYSTEM: Microsoft Windows XP Professional http://secunia.com/product/22/ Microsoft Windows XP Home Edition http://secunia.com/product/16/ Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/ Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/ Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/ Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/
SOFTWARE: Microsoft Windows Services for UNIX 2.x http://secunia.com/product/5243/ Microsoft Windows Services for UNIX 3.x http://secunia.com/product/5244/
DESCRIPTION: Ga\xebl Delalleau has reported a weakness has been reported in Microsoft Windows, which can be exploited by malicious people to gain knowledge of various information.
Successful exploitation requires that a user e.g. visits a malicious web site or is tricked into clicking a specially crafted link.
SOLUTION: Apply patches.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200506-0133", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sunos", "scope": "eq", "trust": 1.3, "vendor": "sun", "version": "5.9" }, { "model": "kerberos 5", "scope": "eq", "trust": 1.0, "vendor": "mit", "version": "1.3.4" }, { "model": "telnet client", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "5.1.2600.2180" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.3.9" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.7" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.3.9" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.7" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "seam", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.0 (for solaris 7)" }, { "model": "seam", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.0.1 (for solaris 8)" }, { "model": "seam", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "1.0.2 (for solaris 9)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1" }, { "model": "kerberos", "scope": "eq", "trust": 0.6, "vendor": "mit", "version": "5-1.3.4" }, { "model": "solaris", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "5.9" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "windows xp home sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8.0" }, { "model": "sunos x86", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.4" }, { "model": "seam", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "5.2" }, { "model": "windows xp professional", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "4.2" }, { "model": "windows server enterprise edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "solaris 2.7 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "windows server enterprise edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "windows xp tablet pc edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.0" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "windows xp professional edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.2" }, { "model": "windows xp tablet pc edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.4" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "windows server enterprise edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "directory pro", "scope": "eq", "trust": 0.3, "vendor": "cosmicperl", "version": "10.0.3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "kerberos", "scope": "eq", "trust": 0.3, "vendor": "mit", "version": "51.3.6" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "mn100", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.3" }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.5.13" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "seam", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0.2" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "windows xp 64-bit edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.0" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.03" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.0" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.12" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "windows server enterprise edition itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "seam", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.0" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.3" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "windows server standard edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "windows server standard edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8.0" }, { "model": "windows xp media center edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "windows xp media center edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.1" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "3-dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.5.13" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "3.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "sunos x86", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.9" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.3" }, { "model": "windows server datacenter edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "linux imap server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "windows server datacenter edition sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.7" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "sunos", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.8" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "5.0" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.11" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.1" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.2" }, { "model": "windows xp tablet pc edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "windows server enterprise edition itanium sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "suse", "version": null }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.1x86" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "4.4" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.1" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "linux enterprise server for s/390", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.8" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "3-dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.7" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.1" }, { "model": "windows server datacenter edition itanium sp1 beta", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20031" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.0" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "2.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.7" }, { "model": "windows server datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.2" }, { "model": "sunos", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.7" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.3" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.4" }, { "model": "propack sp5", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "linux database server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "services for unix", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2.2" }, { "model": "windows xp professional sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.3" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.4" }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "services for unix", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "4.4.1" }, { "model": "windows server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "services for unix", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "3.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "7.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "windows xp home", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.3" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "windows xp media center edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "linux office server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "propack sp6", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.11" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.2" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "solaris 7.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.3" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.2" }, { "model": "services for unix", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "3.5" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "windows xp professional sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows xp home sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "suse email server iii", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "services for unix", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2.0" }, { "model": "windows xp 64-bit edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.12" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.1" }, { "model": "windows xp 64-bit edition version sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.4" }, { "model": "sunos x86", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "5.7" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "windows server datacenter edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "suse email server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "3.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "linux enterprise server for s/390", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.3" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "4.0" }, { "model": "windows server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "linux connectivity server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "windows xp 64-bit edition version", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows server datacenter edition itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "windows server datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "6.3" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "5.3" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.10" } ], "sources": [ { "db": "CERT/CC", "id": "VU#800829" }, { "db": "BID", "id": "13940" }, { "db": "JVNDB", "id": "JVNDB-2005-000380" }, { "db": "CNNVD", "id": "CNNVD-200506-129" }, { "db": "NVD", "id": "CVE-2005-0488" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sun:seam", "vulnerable": true }, { "cpe22Uri": "cpe:/o:sun:solaris", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000380" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ga\u0026euml;l Delalleau gael.delalleau+ moz@m4x.org", "sources": [ { "db": "CNNVD", "id": "CNNVD-200506-129" } ], "trust": 0.6 }, "cve": "CVE-2005-0488", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2005-0488", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2005-0488", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#800829", "trust": 0.8, "value": "0.17" }, { "author": "NVD", "id": "CVE-2005-0488", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200506-129", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#800829" }, { "db": "JVNDB", "id": "JVNDB-2005-000380" }, { "db": "CNNVD", "id": "CNNVD-200506-129" }, { "db": "NVD", "id": "CVE-2005-0488" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command. Included with many products Telnet Clients NEW-ENVIRON By command Telnet There is a problem that the environment variable information is illegally taken because the restriction of the environment variable sent to the server is inappropriate.By a third party IFRAME Tag and \"TELNET://\" Formal URI Etc., Web Malicious via page or email Telnet By enticing a target user to connect to a server, they may be able to obtain important information about the target system, such as the user\u0027s name, search path for executables, and locations of important data. still, Microsoft Windows 2000 Is not affected by this issue, Microsoft Windows Services for UNIX If you are using, you may be affected by this issue. Also some Linux Included with the distribution Kerberos Has been reported to be affected by this issue. Telnet clients provided by multiple vendors are prone to a remote information-disclosure vulnerability. \nAttackers can retrieve any information stored in the environment of clients using the affected telnet application. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nMicrosoft Telnet Client Information Disclosure Weakness\n\nSECUNIA ADVISORY ID:\nSA15690\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15690/\n\nCRITICAL:\nNot critical\n\nIMPACT:\nExposure of system information\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nMicrosoft Windows XP Professional\nhttp://secunia.com/product/22/\nMicrosoft Windows XP Home Edition\nhttp://secunia.com/product/16/\nMicrosoft Windows Server 2003 Web Edition\nhttp://secunia.com/product/1176/\nMicrosoft Windows Server 2003 Datacenter Edition\nhttp://secunia.com/product/1175/\nMicrosoft Windows Server 2003 Standard Edition\nhttp://secunia.com/product/1173/\nMicrosoft Windows Server 2003 Enterprise Edition\nhttp://secunia.com/product/1174/\n\nSOFTWARE:\nMicrosoft Windows Services for UNIX 2.x\nhttp://secunia.com/product/5243/\nMicrosoft Windows Services for UNIX 3.x\nhttp://secunia.com/product/5244/\n\nDESCRIPTION:\nGa\\xebl Delalleau has reported a weakness has been reported in Microsoft\nWindows, which can be exploited by malicious people to gain knowledge\nof various information. \n\nSuccessful exploitation requires that a user e.g. visits a malicious\nweb site or is tricked into clicking a specially crafted link. \n\nSOLUTION:\nApply patches. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-0488" }, { "db": "CERT/CC", "id": "VU#800829" }, { "db": "JVNDB", "id": "JVNDB-2005-000380" }, { "db": "BID", "id": "13940" }, { "db": "PACKETSTORM", "id": "37995" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-0488", "trust": 3.5 }, { "db": "CERT/CC", "id": "VU#800829", "trust": 3.2 }, { "db": "BID", "id": "13940", "trust": 2.7 }, { "db": "USCERT", "id": "TA06-214A", "trust": 2.4 }, { "db": "SECTRACK", "id": "1014203", "trust": 1.6 }, { "db": "SECUNIA", "id": "17135", "trust": 1.6 }, { "db": "SECUNIA", "id": "21253", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3101", "trust": 1.6 }, { "db": "BID", "id": "19289", "trust": 1.6 }, { "db": "SECUNIA", "id": "15690", "trust": 0.9 }, { "db": "USCERT", "id": "SA06-214A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000380", "trust": 0.8 }, { "db": "CERT/CC", "id": "TA06-214A", "trust": 0.6 }, { "db": "SUNALERT", "id": "101665", "trust": 0.6 }, { "db": "SUNALERT", "id": "57761", "trust": 0.6 }, { "db": "SUNALERT", "id": "101671", "trust": 0.6 }, { "db": "SUNALERT", "id": "57755", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:1139", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:504", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:562", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2006-08-01", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SR:2005:016", "trust": 0.6 }, { "db": "IDEFENSE", "id": "20050614 MULTIPLE VENDOR TELNET CLIENT INFORMATION DISCLOSURE VULNERABILITY", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200506-129", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "37995", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#800829" }, { "db": "BID", "id": "13940" }, { "db": "JVNDB", "id": "JVNDB-2005-000380" }, { "db": "PACKETSTORM", "id": "37995" }, { "db": "CNNVD", "id": "CNNVD-200506-129" }, { "db": "NVD", "id": "CVE-2005-0488" } ] }, "id": "VAR-200506-0133", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4615448 }, "last_update_date": "2024-11-29T19:42:57.751000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Update 2006-004 Mac OS X 10.4.7 Client (PPC)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate2006004macosx1047clientppc.html" }, { "title": "Security Update 2006-004 (10.3.9 Client)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate20060041039client.html" }, { "title": "Security Update 2006-004 (10.3.9 Server)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate20060041039server.html" }, { "title": "Security Update 2006-004 Mac OS X 10.4.7 Client (Intel)", "trust": 0.8, "url": "http://www.apple.com/support/downloads/securityupdate2006004macosx1047clientintel.html" }, { "title": "Security Update 2006-004", "trust": 0.8, "url": "http://docs.info.apple.com/jarticle.html?artnum=304063-en" }, { "title": "Security Update 2006-004", "trust": 0.8, "url": "http://docs.info.apple.com/jarticle.html?artnum=304063" }, { "title": "krb5 (V2.x)", "trust": 0.8, "url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=168" }, { "title": "telnet (V2.x)", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=1087" }, { "title": "RHSA-2005:504", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-504.html" }, { "title": "RHSA-2005:562", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-562.html" }, { "title": "101665", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "title": "101671", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "title": "101665", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-3" }, { "title": "101671", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-3" }, { "title": "Security Update 2006-004 (10.3.9 Client)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate20060041039client.html" }, { "title": "Security Update 2006-004 (10.3.9 Server)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate20060041039server.html" }, { "title": "Security Update 2006-004 Mac OS X 10.4.7 Client (Intel)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2006004macosx1047clientintel.html" }, { "title": "Security Update 2006-004 Mac OS X 10.4.7 Client (PPC)", "trust": 0.8, "url": "http://www.apple.com/jp/ftp-info/reference/securityupdate2006004macosx1047clientppc.html" }, { "title": "RHSA-2005:562", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-562J.html" }, { "title": "RHSA-2005:504", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-504J.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000380" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0488" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/13940" }, { "trust": 2.4, "url": "http://www.us-cert.gov/cas/techalerts/ta06-214a.html" }, { "trust": 2.4, "url": "http://www.kb.cert.org/vuls/id/800829" }, { "trust": 1.9, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "trust": 1.9, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "trust": 1.7, "url": "http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2005-504.html" }, { "trust": 1.6, "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/19289" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2005-562.html" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1014203" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21253" }, { "trust": 1.6, "url": "http://secunia.com/advisories/17135" }, { "trust": 1.6, "url": "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11373" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1139" }, { "trust": 0.9, "url": "http://secunia.com/advisories/15690/" }, { "trust": 0.8, "url": "http://www.idefense.com/application/poi/display?id=260" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0488" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1205" }, { "trust": 0.8, "url": "http://www.apps.ietf.org/rfc/rfc1572.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/archive/1/402230" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0488" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta06-214a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta06-214a/" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0488" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa06-214a.html" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3101" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:1139" }, { "trust": 0.4, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-033.mspx" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-145_rhsa-2005-504.pdf" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-562.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-567.html" }, { "trust": 0.3, "url": "http://www.microsoft.com/windowsserversystem/sfu/" }, { "trust": 0.3, "url": "http://tech.f5.com/home/bigip/solutions/advisories/sol4616.html" }, { "trust": 0.3, "url": "/archive/1/402230" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=32c4e286-2c4d-491a-9e05-4ca0b055d5dc" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/1176/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/22/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=c6161d9e-1672-479e-8baf-754a64dfab47" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=7c3dd615-b82d-4520-9c3a-376283b01d5b" }, { "trust": 0.1, "url": "http://secunia.com/product/1175/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/16/" }, { "trust": 0.1, "url": "http://secunia.com/product/5243/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=22095e78-a559-40ea-8b65-9c727f4e752f" }, { "trust": 0.1, "url": "http://secunia.com/product/5244/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=b8ba775e-e9a7-47e9-81a9-a68a71b9faac" }, { "trust": 0.1, "url": "http://secunia.com/product/1173/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=dcc6840f-e626-4266-a63a-cddec0ec44d6" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=b281550b-8fae-4ff3-9bb7-e4ba325779b9" }, { "trust": 0.1, "url": "http://secunia.com/product/1174/" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=8eaad650-54db-44bc-ac9b-fc8a50f5a3b5" }, { "trust": 0.1, "url": "http://www.microsoft.com/downloads/details.aspx?familyid=c23a4e16-e228-4a80-a4cb-9dcef462b97a" } ], "sources": [ { "db": "CERT/CC", "id": "VU#800829" }, { "db": "BID", "id": "13940" }, { "db": "JVNDB", "id": "JVNDB-2005-000380" }, { "db": "PACKETSTORM", "id": "37995" }, { "db": "CNNVD", "id": "CNNVD-200506-129" }, { "db": "NVD", "id": "CVE-2005-0488" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#800829" }, { "db": "BID", "id": "13940" }, { "db": "JVNDB", "id": "JVNDB-2005-000380" }, { "db": "PACKETSTORM", "id": "37995" }, { "db": "CNNVD", "id": "CNNVD-200506-129" }, { "db": "NVD", "id": "CVE-2005-0488" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-06-14T00:00:00", "db": "CERT/CC", "id": "VU#800829" }, { "date": "2005-06-14T00:00:00", "db": "BID", "id": "13940" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000380" }, { "date": "2005-06-16T05:01:37", "db": "PACKETSTORM", "id": "37995" }, { "date": "2005-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-200506-129" }, { "date": "2005-06-14T04:00:00", "db": "NVD", "id": "CVE-2005-0488" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-07-28T00:00:00", "db": "CERT/CC", "id": "VU#800829" }, { "date": "2006-08-02T20:16:00", "db": "BID", "id": "13940" }, { "date": "2007-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000380" }, { "date": "2012-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-200506-129" }, { "date": "2024-11-20T23:55:14.960000", "db": "NVD", "id": "CVE-2005-0488" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200506-129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Telnet Client Information Disclosure Vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#800829" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200506-129" } ], "trust": 0.6 } }
ghsa-r4w9-9whg-94xw
Vulnerability from github
Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
{ "affected": [], "aliases": [ "CVE-2005-0488" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-06-14T04:00:00Z", "severity": "MODERATE" }, "details": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.", "id": "GHSA-r4w9-9whg-94xw", "modified": "2022-05-01T01:49:44Z", "published": "2022-05-01T01:49:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0488" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139" }, { "type": "WEB", "url": "http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/17135" }, { "type": "WEB", "url": "http://secunia.com/advisories/21253" }, { "type": "WEB", "url": "http://securitytracker.com/id?1014203" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/800829" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-504.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-562.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/13940" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19289" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3101" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2005_562
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated krb5 packages which fix multiple security issues are now available\nfor Red Hat Enterprise Linux 2.1 and 3.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.\n\n[Updated 26 Sep 2005]\nkrb5-server packages have been added to this advisory for Red Hat\nEnterprise Linux 3 WS and Red Hat Enterprise Linux 3 Desktop.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a networked authentication system which uses a trusted third\nparty (a KDC) to authenticate clients and servers to each other.\n\nA double-free flaw was found in the krb5_recvauth() routine which may be\ntriggered by a remote unauthenticated attacker. Although no exploit is\ncurrently known to exist, this issue could potentially be exploited to\nallow arbitrary code execution on a Key Distribution Center (KDC). The\nCommon Vulnerabilities and Exposures project assigned the name\nCAN-2005-1689 to this issue. \n\nDaniel Wachdorf discovered a single byte heap overflow in the\nkrb5_unparse_name() function, part of krb5-libs. Sucessful exploitation of\nthis flaw would lead to a denial of service (crash). To trigger this flaw\nan attacker would need to have control of a kerberos realm that shares a\ncross-realm key with the target, making exploitation of this flaw unlikely.\n(CAN-2005-1175). \n\nGa\u00ebl Delalleau discovered an information disclosure issue in the way\nsome telnet clients handle messages from a server. An attacker could\nconstruct a malicious telnet server that collects information from the\nenvironment of any victim who connects to it using the Kerberos-aware\ntelnet client (CAN-2005-0488).\n\nThe rcp protocol allows a server to instruct a client to write to arbitrary\nfiles outside of the current directory. This could potentially cause a\nsecurity issue if a user uses the Kerberos-aware rcp to copy files from a\nmalicious server (CAN-2004-0175). \n\nAll users of krb5 should update to these erratum packages which contain\nbackported patches to correct these issues. Red Hat would like to thank\nthe MIT Kerberos Development Team for their responsible disclosure of these\nissues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:562", "url": "https://access.redhat.com/errata/RHSA-2005:562" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txt", "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txt" }, { "category": "external", "summary": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt", "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt" }, { "category": "external", "summary": "159304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159304" }, { "category": "external", "summary": "159753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159753" }, { "category": "external", "summary": "161471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161471" }, { "category": "external", "summary": "161611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161611" }, { "category": "external", "summary": "162255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162255" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_562.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-21T23:52:34+00:00", "generator": { "date": "2024-11-21T23:52:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:562", "initial_release_date": "2005-07-12T18:12:00+00:00", "revision_history": [ { "date": "2005-07-12T18:12:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-07-12T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:52:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.2.7-47.ia64", "product": { "name": "krb5-devel-0:1.2.7-47.ia64", "product_id": "krb5-devel-0:1.2.7-47.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-47?arch=ia64" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-47.ia64", "product": { "name": "krb5-server-0:1.2.7-47.ia64", "product_id": "krb5-server-0:1.2.7-47.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-47?arch=ia64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.2.7-47.ia64", "product": { "name": "krb5-libs-0:1.2.7-47.ia64", "product_id": "krb5-libs-0:1.2.7-47.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-47?arch=ia64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.2.7-47.ia64", "product": { "name": "krb5-workstation-0:1.2.7-47.ia64", "product_id": "krb5-workstation-0:1.2.7-47.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-47?arch=ia64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-47.ia64", "product": { "name": "krb5-debuginfo-0:1.2.7-47.ia64", "product_id": "krb5-debuginfo-0:1.2.7-47.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-47?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.2.7-47.i386", "product": { "name": "krb5-libs-0:1.2.7-47.i386", "product_id": "krb5-libs-0:1.2.7-47.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-47?arch=i386" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-47.i386", "product": { "name": "krb5-debuginfo-0:1.2.7-47.i386", "product_id": "krb5-debuginfo-0:1.2.7-47.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-47?arch=i386" } } }, { "category": "product_version", "name": "krb5-devel-0:1.2.7-47.i386", "product": { "name": "krb5-devel-0:1.2.7-47.i386", "product_id": "krb5-devel-0:1.2.7-47.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-47?arch=i386" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-47.i386", "product": { "name": "krb5-server-0:1.2.7-47.i386", "product_id": "krb5-server-0:1.2.7-47.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-47?arch=i386" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.2.7-47.i386", "product": { "name": "krb5-workstation-0:1.2.7-47.i386", "product_id": "krb5-workstation-0:1.2.7-47.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-47?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.2.7-47.x86_64", "product": { "name": "krb5-devel-0:1.2.7-47.x86_64", "product_id": "krb5-devel-0:1.2.7-47.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-47?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-47.x86_64", "product": { "name": "krb5-server-0:1.2.7-47.x86_64", "product_id": "krb5-server-0:1.2.7-47.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-47?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.2.7-47.x86_64", "product": { "name": "krb5-libs-0:1.2.7-47.x86_64", "product_id": "krb5-libs-0:1.2.7-47.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-47?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.2.7-47.x86_64", "product": { "name": "krb5-workstation-0:1.2.7-47.x86_64", "product_id": "krb5-workstation-0:1.2.7-47.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-47?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-47.x86_64", "product": { "name": "krb5-debuginfo-0:1.2.7-47.x86_64", "product_id": "krb5-debuginfo-0:1.2.7-47.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-47?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.2.7-47.src", "product": { "name": "krb5-0:1.2.7-47.src", "product_id": "krb5-0:1.2.7-47.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.2.7-47?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.2.7-47.ppc", "product": { "name": "krb5-devel-0:1.2.7-47.ppc", "product_id": "krb5-devel-0:1.2.7-47.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-47?arch=ppc" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-47.ppc", "product": { "name": "krb5-server-0:1.2.7-47.ppc", "product_id": "krb5-server-0:1.2.7-47.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-47?arch=ppc" } } }, { "category": "product_version", "name": "krb5-libs-0:1.2.7-47.ppc", "product": { "name": "krb5-libs-0:1.2.7-47.ppc", "product_id": "krb5-libs-0:1.2.7-47.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-47?arch=ppc" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.2.7-47.ppc", "product": { "name": "krb5-workstation-0:1.2.7-47.ppc", "product_id": "krb5-workstation-0:1.2.7-47.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-47?arch=ppc" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-47.ppc", "product": { "name": "krb5-debuginfo-0:1.2.7-47.ppc", "product_id": "krb5-debuginfo-0:1.2.7-47.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-47?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.2.7-47.ppc64", "product": { "name": "krb5-libs-0:1.2.7-47.ppc64", "product_id": "krb5-libs-0:1.2.7-47.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-47?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-47.ppc64", "product": { "name": "krb5-debuginfo-0:1.2.7-47.ppc64", "product_id": "krb5-debuginfo-0:1.2.7-47.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-47?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.2.7-47.s390x", "product": { "name": "krb5-devel-0:1.2.7-47.s390x", "product_id": "krb5-devel-0:1.2.7-47.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-47?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-47.s390x", "product": { "name": "krb5-server-0:1.2.7-47.s390x", "product_id": "krb5-server-0:1.2.7-47.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-47?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.2.7-47.s390x", "product": { "name": "krb5-libs-0:1.2.7-47.s390x", "product_id": "krb5-libs-0:1.2.7-47.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-47?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.2.7-47.s390x", "product": { "name": "krb5-workstation-0:1.2.7-47.s390x", "product_id": "krb5-workstation-0:1.2.7-47.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-47?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-47.s390x", "product": { "name": "krb5-debuginfo-0:1.2.7-47.s390x", "product_id": "krb5-debuginfo-0:1.2.7-47.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-47?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.2.7-47.s390", "product": { "name": "krb5-libs-0:1.2.7-47.s390", "product_id": "krb5-libs-0:1.2.7-47.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-47?arch=s390" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-47.s390", "product": { "name": "krb5-debuginfo-0:1.2.7-47.s390", "product_id": "krb5-debuginfo-0:1.2.7-47.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-47?arch=s390" } } }, { "category": "product_version", "name": "krb5-devel-0:1.2.7-47.s390", "product": { "name": "krb5-devel-0:1.2.7-47.s390", "product_id": "krb5-devel-0:1.2.7-47.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-47?arch=s390" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-47.s390", "product": { "name": "krb5-server-0:1.2.7-47.s390", "product_id": "krb5-server-0:1.2.7-47.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-47?arch=s390" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.2.7-47.s390", "product": { "name": "krb5-workstation-0:1.2.7-47.s390", "product_id": "krb5-workstation-0:1.2.7-47.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-47?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.2.7-47.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-0:1.2.7-47.src" }, "product_reference": "krb5-0:1.2.7-47.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-47.i386" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-47.ia64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-47.ppc" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-47.ppc64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-47.s390" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-47.s390x" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-47.x86_64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-47.i386" }, "product_reference": "krb5-devel-0:1.2.7-47.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-47.ia64" }, "product_reference": "krb5-devel-0:1.2.7-47.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-47.ppc" }, "product_reference": "krb5-devel-0:1.2.7-47.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-47.s390" }, "product_reference": "krb5-devel-0:1.2.7-47.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-47.s390x" }, "product_reference": "krb5-devel-0:1.2.7-47.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-47.x86_64" }, "product_reference": "krb5-devel-0:1.2.7-47.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-47.i386" }, "product_reference": "krb5-libs-0:1.2.7-47.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-47.ia64" }, "product_reference": "krb5-libs-0:1.2.7-47.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-47.ppc" }, "product_reference": "krb5-libs-0:1.2.7-47.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-47.ppc64" }, "product_reference": "krb5-libs-0:1.2.7-47.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-47.s390" }, "product_reference": "krb5-libs-0:1.2.7-47.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-47.s390x" }, "product_reference": "krb5-libs-0:1.2.7-47.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-47.x86_64" }, "product_reference": "krb5-libs-0:1.2.7-47.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-47.i386" }, "product_reference": "krb5-server-0:1.2.7-47.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-47.ia64" }, "product_reference": "krb5-server-0:1.2.7-47.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-47.ppc" }, "product_reference": "krb5-server-0:1.2.7-47.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-47.s390" }, "product_reference": "krb5-server-0:1.2.7-47.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-47.s390x" }, "product_reference": "krb5-server-0:1.2.7-47.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-47.x86_64" }, "product_reference": "krb5-server-0:1.2.7-47.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-47.i386" }, "product_reference": "krb5-workstation-0:1.2.7-47.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-47.ia64" }, "product_reference": "krb5-workstation-0:1.2.7-47.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-47.ppc" }, "product_reference": "krb5-workstation-0:1.2.7-47.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-47.s390" }, "product_reference": "krb5-workstation-0:1.2.7-47.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-47.s390x" }, "product_reference": "krb5-workstation-0:1.2.7-47.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-47.x86_64" }, "product_reference": "krb5-workstation-0:1.2.7-47.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.2.7-47.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-0:1.2.7-47.src" }, "product_reference": "krb5-0:1.2.7-47.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-47.i386" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-47.s390" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-47.i386" }, "product_reference": "krb5-devel-0:1.2.7-47.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-47.ia64" }, "product_reference": "krb5-devel-0:1.2.7-47.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-47.ppc" }, "product_reference": "krb5-devel-0:1.2.7-47.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-47.s390" }, "product_reference": "krb5-devel-0:1.2.7-47.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-47.s390x" }, "product_reference": "krb5-devel-0:1.2.7-47.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-47.x86_64" }, "product_reference": "krb5-devel-0:1.2.7-47.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-47.i386" }, "product_reference": "krb5-libs-0:1.2.7-47.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-47.ia64" }, "product_reference": "krb5-libs-0:1.2.7-47.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-47.ppc" }, "product_reference": "krb5-libs-0:1.2.7-47.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-47.ppc64" }, "product_reference": "krb5-libs-0:1.2.7-47.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-47.s390" }, "product_reference": "krb5-libs-0:1.2.7-47.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-47.s390x" }, "product_reference": "krb5-libs-0:1.2.7-47.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-47.x86_64" }, "product_reference": "krb5-libs-0:1.2.7-47.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-47.i386" }, "product_reference": "krb5-server-0:1.2.7-47.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-47.ia64" }, "product_reference": "krb5-server-0:1.2.7-47.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-47.ppc" }, "product_reference": "krb5-server-0:1.2.7-47.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-47.s390" }, "product_reference": "krb5-server-0:1.2.7-47.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-47.s390x" }, "product_reference": "krb5-server-0:1.2.7-47.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-47.x86_64" }, "product_reference": "krb5-server-0:1.2.7-47.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-47.i386" }, "product_reference": "krb5-workstation-0:1.2.7-47.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-47.ia64" }, "product_reference": "krb5-workstation-0:1.2.7-47.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-47.ppc" }, "product_reference": "krb5-workstation-0:1.2.7-47.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-47.s390" }, "product_reference": "krb5-workstation-0:1.2.7-47.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-47.s390x" }, "product_reference": "krb5-workstation-0:1.2.7-47.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-47.x86_64" }, "product_reference": "krb5-workstation-0:1.2.7-47.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.2.7-47.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-0:1.2.7-47.src" }, "product_reference": "krb5-0:1.2.7-47.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-47.i386" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-47.ia64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-47.ppc" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-47.ppc64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-47.s390" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-47.s390x" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-47.x86_64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-47.i386" }, "product_reference": "krb5-devel-0:1.2.7-47.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-47.ia64" }, "product_reference": "krb5-devel-0:1.2.7-47.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-47.ppc" }, "product_reference": "krb5-devel-0:1.2.7-47.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-47.s390" }, "product_reference": "krb5-devel-0:1.2.7-47.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-47.s390x" }, "product_reference": "krb5-devel-0:1.2.7-47.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-47.x86_64" }, "product_reference": "krb5-devel-0:1.2.7-47.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-47.i386" }, "product_reference": "krb5-libs-0:1.2.7-47.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-47.ia64" }, "product_reference": "krb5-libs-0:1.2.7-47.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-47.ppc" }, "product_reference": "krb5-libs-0:1.2.7-47.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-47.ppc64" }, "product_reference": "krb5-libs-0:1.2.7-47.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-47.s390" }, "product_reference": "krb5-libs-0:1.2.7-47.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-47.s390x" }, "product_reference": "krb5-libs-0:1.2.7-47.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-47.x86_64" }, "product_reference": "krb5-libs-0:1.2.7-47.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-47.i386" }, "product_reference": "krb5-server-0:1.2.7-47.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-47.ia64" }, "product_reference": "krb5-server-0:1.2.7-47.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-47.ppc" }, "product_reference": "krb5-server-0:1.2.7-47.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-47.s390" }, "product_reference": "krb5-server-0:1.2.7-47.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-47.s390x" }, "product_reference": "krb5-server-0:1.2.7-47.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-47.x86_64" }, "product_reference": "krb5-server-0:1.2.7-47.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-47.i386" }, "product_reference": "krb5-workstation-0:1.2.7-47.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-47.ia64" }, "product_reference": "krb5-workstation-0:1.2.7-47.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-47.ppc" }, "product_reference": "krb5-workstation-0:1.2.7-47.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-47.s390" }, "product_reference": "krb5-workstation-0:1.2.7-47.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-47.s390x" }, "product_reference": "krb5-workstation-0:1.2.7-47.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-47.x86_64" }, "product_reference": "krb5-workstation-0:1.2.7-47.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.2.7-47.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-0:1.2.7-47.src" }, "product_reference": "krb5-0:1.2.7-47.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-47.i386" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-47.ia64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-47.ppc" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-47.ppc64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-47.s390" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-47.s390x" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-47.x86_64" }, "product_reference": "krb5-debuginfo-0:1.2.7-47.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-47.i386" }, "product_reference": "krb5-devel-0:1.2.7-47.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-47.ia64" }, "product_reference": "krb5-devel-0:1.2.7-47.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-47.ppc" }, "product_reference": "krb5-devel-0:1.2.7-47.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-47.s390" }, "product_reference": "krb5-devel-0:1.2.7-47.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-47.s390x" }, "product_reference": "krb5-devel-0:1.2.7-47.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-47.x86_64" }, "product_reference": "krb5-devel-0:1.2.7-47.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-47.i386" }, "product_reference": "krb5-libs-0:1.2.7-47.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-47.ia64" }, "product_reference": "krb5-libs-0:1.2.7-47.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-47.ppc" }, "product_reference": "krb5-libs-0:1.2.7-47.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-47.ppc64" }, "product_reference": "krb5-libs-0:1.2.7-47.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-47.s390" }, "product_reference": "krb5-libs-0:1.2.7-47.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-47.s390x" }, "product_reference": "krb5-libs-0:1.2.7-47.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-47.x86_64" }, "product_reference": "krb5-libs-0:1.2.7-47.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-47.i386" }, "product_reference": "krb5-server-0:1.2.7-47.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-47.ia64" }, "product_reference": "krb5-server-0:1.2.7-47.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-47.ppc" }, "product_reference": "krb5-server-0:1.2.7-47.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-47.s390" }, "product_reference": "krb5-server-0:1.2.7-47.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-47.s390x" }, "product_reference": "krb5-server-0:1.2.7-47.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-47.x86_64" }, "product_reference": "krb5-server-0:1.2.7-47.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-47.i386" }, "product_reference": "krb5-workstation-0:1.2.7-47.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-47.ia64" }, "product_reference": "krb5-workstation-0:1.2.7-47.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-47.ppc" }, "product_reference": "krb5-workstation-0:1.2.7-47.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-47.s390" }, "product_reference": "krb5-workstation-0:1.2.7-47.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-47.s390x" }, "product_reference": "krb5-workstation-0:1.2.7-47.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-47.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-47.x86_64" }, "product_reference": "krb5-workstation-0:1.2.7-47.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the MIT Kerberos project" ] } ], "cve": "CVE-2004-0175", "discovery_date": "2004-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617166" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files. NOTE: this may be a rediscovery of CVE-2000-0992.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:krb5-0:1.2.7-47.src", "3AS:krb5-debuginfo-0:1.2.7-47.i386", "3AS:krb5-debuginfo-0:1.2.7-47.ia64", "3AS:krb5-debuginfo-0:1.2.7-47.ppc", "3AS:krb5-debuginfo-0:1.2.7-47.ppc64", "3AS:krb5-debuginfo-0:1.2.7-47.s390", "3AS:krb5-debuginfo-0:1.2.7-47.s390x", "3AS:krb5-debuginfo-0:1.2.7-47.x86_64", "3AS:krb5-devel-0:1.2.7-47.i386", "3AS:krb5-devel-0:1.2.7-47.ia64", "3AS:krb5-devel-0:1.2.7-47.ppc", "3AS:krb5-devel-0:1.2.7-47.s390", "3AS:krb5-devel-0:1.2.7-47.s390x", "3AS:krb5-devel-0:1.2.7-47.x86_64", "3AS:krb5-libs-0:1.2.7-47.i386", "3AS:krb5-libs-0:1.2.7-47.ia64", "3AS:krb5-libs-0:1.2.7-47.ppc", "3AS:krb5-libs-0:1.2.7-47.ppc64", "3AS:krb5-libs-0:1.2.7-47.s390", "3AS:krb5-libs-0:1.2.7-47.s390x", "3AS:krb5-libs-0:1.2.7-47.x86_64", "3AS:krb5-server-0:1.2.7-47.i386", "3AS:krb5-server-0:1.2.7-47.ia64", "3AS:krb5-server-0:1.2.7-47.ppc", "3AS:krb5-server-0:1.2.7-47.s390", "3AS:krb5-server-0:1.2.7-47.s390x", "3AS:krb5-server-0:1.2.7-47.x86_64", "3AS:krb5-workstation-0:1.2.7-47.i386", "3AS:krb5-workstation-0:1.2.7-47.ia64", "3AS:krb5-workstation-0:1.2.7-47.ppc", "3AS:krb5-workstation-0:1.2.7-47.s390", "3AS:krb5-workstation-0:1.2.7-47.s390x", "3AS:krb5-workstation-0:1.2.7-47.x86_64", "3Desktop:krb5-0:1.2.7-47.src", "3Desktop:krb5-debuginfo-0:1.2.7-47.i386", "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64", "3Desktop:krb5-devel-0:1.2.7-47.i386", "3Desktop:krb5-devel-0:1.2.7-47.ia64", "3Desktop:krb5-devel-0:1.2.7-47.ppc", "3Desktop:krb5-devel-0:1.2.7-47.s390", "3Desktop:krb5-devel-0:1.2.7-47.s390x", "3Desktop:krb5-devel-0:1.2.7-47.x86_64", "3Desktop:krb5-libs-0:1.2.7-47.i386", "3Desktop:krb5-libs-0:1.2.7-47.ia64", "3Desktop:krb5-libs-0:1.2.7-47.ppc", "3Desktop:krb5-libs-0:1.2.7-47.ppc64", "3Desktop:krb5-libs-0:1.2.7-47.s390", "3Desktop:krb5-libs-0:1.2.7-47.s390x", "3Desktop:krb5-libs-0:1.2.7-47.x86_64", "3Desktop:krb5-server-0:1.2.7-47.i386", "3Desktop:krb5-server-0:1.2.7-47.ia64", "3Desktop:krb5-server-0:1.2.7-47.ppc", "3Desktop:krb5-server-0:1.2.7-47.s390", "3Desktop:krb5-server-0:1.2.7-47.s390x", "3Desktop:krb5-server-0:1.2.7-47.x86_64", "3Desktop:krb5-workstation-0:1.2.7-47.i386", "3Desktop:krb5-workstation-0:1.2.7-47.ia64", "3Desktop:krb5-workstation-0:1.2.7-47.ppc", "3Desktop:krb5-workstation-0:1.2.7-47.s390", "3Desktop:krb5-workstation-0:1.2.7-47.s390x", "3Desktop:krb5-workstation-0:1.2.7-47.x86_64", "3ES:krb5-0:1.2.7-47.src", "3ES:krb5-debuginfo-0:1.2.7-47.i386", "3ES:krb5-debuginfo-0:1.2.7-47.ia64", "3ES:krb5-debuginfo-0:1.2.7-47.ppc", "3ES:krb5-debuginfo-0:1.2.7-47.ppc64", "3ES:krb5-debuginfo-0:1.2.7-47.s390", "3ES:krb5-debuginfo-0:1.2.7-47.s390x", "3ES:krb5-debuginfo-0:1.2.7-47.x86_64", "3ES:krb5-devel-0:1.2.7-47.i386", "3ES:krb5-devel-0:1.2.7-47.ia64", "3ES:krb5-devel-0:1.2.7-47.ppc", "3ES:krb5-devel-0:1.2.7-47.s390", "3ES:krb5-devel-0:1.2.7-47.s390x", "3ES:krb5-devel-0:1.2.7-47.x86_64", "3ES:krb5-libs-0:1.2.7-47.i386", "3ES:krb5-libs-0:1.2.7-47.ia64", "3ES:krb5-libs-0:1.2.7-47.ppc", "3ES:krb5-libs-0:1.2.7-47.ppc64", "3ES:krb5-libs-0:1.2.7-47.s390", "3ES:krb5-libs-0:1.2.7-47.s390x", "3ES:krb5-libs-0:1.2.7-47.x86_64", "3ES:krb5-server-0:1.2.7-47.i386", "3ES:krb5-server-0:1.2.7-47.ia64", "3ES:krb5-server-0:1.2.7-47.ppc", "3ES:krb5-server-0:1.2.7-47.s390", "3ES:krb5-server-0:1.2.7-47.s390x", "3ES:krb5-server-0:1.2.7-47.x86_64", "3ES:krb5-workstation-0:1.2.7-47.i386", "3ES:krb5-workstation-0:1.2.7-47.ia64", "3ES:krb5-workstation-0:1.2.7-47.ppc", "3ES:krb5-workstation-0:1.2.7-47.s390", "3ES:krb5-workstation-0:1.2.7-47.s390x", "3ES:krb5-workstation-0:1.2.7-47.x86_64", "3WS:krb5-0:1.2.7-47.src", "3WS:krb5-debuginfo-0:1.2.7-47.i386", "3WS:krb5-debuginfo-0:1.2.7-47.ia64", "3WS:krb5-debuginfo-0:1.2.7-47.ppc", "3WS:krb5-debuginfo-0:1.2.7-47.ppc64", "3WS:krb5-debuginfo-0:1.2.7-47.s390", "3WS:krb5-debuginfo-0:1.2.7-47.s390x", "3WS:krb5-debuginfo-0:1.2.7-47.x86_64", "3WS:krb5-devel-0:1.2.7-47.i386", "3WS:krb5-devel-0:1.2.7-47.ia64", "3WS:krb5-devel-0:1.2.7-47.ppc", "3WS:krb5-devel-0:1.2.7-47.s390", "3WS:krb5-devel-0:1.2.7-47.s390x", "3WS:krb5-devel-0:1.2.7-47.x86_64", "3WS:krb5-libs-0:1.2.7-47.i386", "3WS:krb5-libs-0:1.2.7-47.ia64", "3WS:krb5-libs-0:1.2.7-47.ppc", "3WS:krb5-libs-0:1.2.7-47.ppc64", "3WS:krb5-libs-0:1.2.7-47.s390", "3WS:krb5-libs-0:1.2.7-47.s390x", "3WS:krb5-libs-0:1.2.7-47.x86_64", "3WS:krb5-server-0:1.2.7-47.i386", "3WS:krb5-server-0:1.2.7-47.ia64", "3WS:krb5-server-0:1.2.7-47.ppc", "3WS:krb5-server-0:1.2.7-47.s390", "3WS:krb5-server-0:1.2.7-47.s390x", "3WS:krb5-server-0:1.2.7-47.x86_64", "3WS:krb5-workstation-0:1.2.7-47.i386", "3WS:krb5-workstation-0:1.2.7-47.ia64", "3WS:krb5-workstation-0:1.2.7-47.ppc", "3WS:krb5-workstation-0:1.2.7-47.s390", "3WS:krb5-workstation-0:1.2.7-47.s390x", "3WS:krb5-workstation-0:1.2.7-47.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0175" }, { "category": "external", "summary": "RHBZ#1617166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0175", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0175" } ], "release_date": "2000-09-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-07-12T18:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:krb5-0:1.2.7-47.src", "3AS:krb5-debuginfo-0:1.2.7-47.i386", "3AS:krb5-debuginfo-0:1.2.7-47.ia64", "3AS:krb5-debuginfo-0:1.2.7-47.ppc", "3AS:krb5-debuginfo-0:1.2.7-47.ppc64", "3AS:krb5-debuginfo-0:1.2.7-47.s390", "3AS:krb5-debuginfo-0:1.2.7-47.s390x", "3AS:krb5-debuginfo-0:1.2.7-47.x86_64", "3AS:krb5-devel-0:1.2.7-47.i386", "3AS:krb5-devel-0:1.2.7-47.ia64", "3AS:krb5-devel-0:1.2.7-47.ppc", "3AS:krb5-devel-0:1.2.7-47.s390", "3AS:krb5-devel-0:1.2.7-47.s390x", "3AS:krb5-devel-0:1.2.7-47.x86_64", "3AS:krb5-libs-0:1.2.7-47.i386", "3AS:krb5-libs-0:1.2.7-47.ia64", "3AS:krb5-libs-0:1.2.7-47.ppc", "3AS:krb5-libs-0:1.2.7-47.ppc64", "3AS:krb5-libs-0:1.2.7-47.s390", "3AS:krb5-libs-0:1.2.7-47.s390x", "3AS:krb5-libs-0:1.2.7-47.x86_64", "3AS:krb5-server-0:1.2.7-47.i386", "3AS:krb5-server-0:1.2.7-47.ia64", "3AS:krb5-server-0:1.2.7-47.ppc", "3AS:krb5-server-0:1.2.7-47.s390", "3AS:krb5-server-0:1.2.7-47.s390x", "3AS:krb5-server-0:1.2.7-47.x86_64", "3AS:krb5-workstation-0:1.2.7-47.i386", "3AS:krb5-workstation-0:1.2.7-47.ia64", "3AS:krb5-workstation-0:1.2.7-47.ppc", "3AS:krb5-workstation-0:1.2.7-47.s390", "3AS:krb5-workstation-0:1.2.7-47.s390x", "3AS:krb5-workstation-0:1.2.7-47.x86_64", "3Desktop:krb5-0:1.2.7-47.src", "3Desktop:krb5-debuginfo-0:1.2.7-47.i386", "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64", "3Desktop:krb5-devel-0:1.2.7-47.i386", "3Desktop:krb5-devel-0:1.2.7-47.ia64", "3Desktop:krb5-devel-0:1.2.7-47.ppc", "3Desktop:krb5-devel-0:1.2.7-47.s390", "3Desktop:krb5-devel-0:1.2.7-47.s390x", "3Desktop:krb5-devel-0:1.2.7-47.x86_64", "3Desktop:krb5-libs-0:1.2.7-47.i386", "3Desktop:krb5-libs-0:1.2.7-47.ia64", "3Desktop:krb5-libs-0:1.2.7-47.ppc", "3Desktop:krb5-libs-0:1.2.7-47.ppc64", "3Desktop:krb5-libs-0:1.2.7-47.s390", "3Desktop:krb5-libs-0:1.2.7-47.s390x", "3Desktop:krb5-libs-0:1.2.7-47.x86_64", "3Desktop:krb5-server-0:1.2.7-47.i386", "3Desktop:krb5-server-0:1.2.7-47.ia64", "3Desktop:krb5-server-0:1.2.7-47.ppc", "3Desktop:krb5-server-0:1.2.7-47.s390", "3Desktop:krb5-server-0:1.2.7-47.s390x", "3Desktop:krb5-server-0:1.2.7-47.x86_64", "3Desktop:krb5-workstation-0:1.2.7-47.i386", "3Desktop:krb5-workstation-0:1.2.7-47.ia64", "3Desktop:krb5-workstation-0:1.2.7-47.ppc", "3Desktop:krb5-workstation-0:1.2.7-47.s390", "3Desktop:krb5-workstation-0:1.2.7-47.s390x", "3Desktop:krb5-workstation-0:1.2.7-47.x86_64", "3ES:krb5-0:1.2.7-47.src", "3ES:krb5-debuginfo-0:1.2.7-47.i386", "3ES:krb5-debuginfo-0:1.2.7-47.ia64", "3ES:krb5-debuginfo-0:1.2.7-47.ppc", "3ES:krb5-debuginfo-0:1.2.7-47.ppc64", "3ES:krb5-debuginfo-0:1.2.7-47.s390", "3ES:krb5-debuginfo-0:1.2.7-47.s390x", "3ES:krb5-debuginfo-0:1.2.7-47.x86_64", "3ES:krb5-devel-0:1.2.7-47.i386", "3ES:krb5-devel-0:1.2.7-47.ia64", "3ES:krb5-devel-0:1.2.7-47.ppc", "3ES:krb5-devel-0:1.2.7-47.s390", "3ES:krb5-devel-0:1.2.7-47.s390x", "3ES:krb5-devel-0:1.2.7-47.x86_64", "3ES:krb5-libs-0:1.2.7-47.i386", "3ES:krb5-libs-0:1.2.7-47.ia64", "3ES:krb5-libs-0:1.2.7-47.ppc", "3ES:krb5-libs-0:1.2.7-47.ppc64", "3ES:krb5-libs-0:1.2.7-47.s390", "3ES:krb5-libs-0:1.2.7-47.s390x", "3ES:krb5-libs-0:1.2.7-47.x86_64", "3ES:krb5-server-0:1.2.7-47.i386", "3ES:krb5-server-0:1.2.7-47.ia64", "3ES:krb5-server-0:1.2.7-47.ppc", "3ES:krb5-server-0:1.2.7-47.s390", "3ES:krb5-server-0:1.2.7-47.s390x", "3ES:krb5-server-0:1.2.7-47.x86_64", "3ES:krb5-workstation-0:1.2.7-47.i386", "3ES:krb5-workstation-0:1.2.7-47.ia64", "3ES:krb5-workstation-0:1.2.7-47.ppc", "3ES:krb5-workstation-0:1.2.7-47.s390", "3ES:krb5-workstation-0:1.2.7-47.s390x", "3ES:krb5-workstation-0:1.2.7-47.x86_64", "3WS:krb5-0:1.2.7-47.src", "3WS:krb5-debuginfo-0:1.2.7-47.i386", "3WS:krb5-debuginfo-0:1.2.7-47.ia64", "3WS:krb5-debuginfo-0:1.2.7-47.ppc", "3WS:krb5-debuginfo-0:1.2.7-47.ppc64", "3WS:krb5-debuginfo-0:1.2.7-47.s390", "3WS:krb5-debuginfo-0:1.2.7-47.s390x", "3WS:krb5-debuginfo-0:1.2.7-47.x86_64", "3WS:krb5-devel-0:1.2.7-47.i386", "3WS:krb5-devel-0:1.2.7-47.ia64", "3WS:krb5-devel-0:1.2.7-47.ppc", "3WS:krb5-devel-0:1.2.7-47.s390", "3WS:krb5-devel-0:1.2.7-47.s390x", "3WS:krb5-devel-0:1.2.7-47.x86_64", "3WS:krb5-libs-0:1.2.7-47.i386", "3WS:krb5-libs-0:1.2.7-47.ia64", "3WS:krb5-libs-0:1.2.7-47.ppc", "3WS:krb5-libs-0:1.2.7-47.ppc64", "3WS:krb5-libs-0:1.2.7-47.s390", "3WS:krb5-libs-0:1.2.7-47.s390x", "3WS:krb5-libs-0:1.2.7-47.x86_64", "3WS:krb5-server-0:1.2.7-47.i386", "3WS:krb5-server-0:1.2.7-47.ia64", "3WS:krb5-server-0:1.2.7-47.ppc", "3WS:krb5-server-0:1.2.7-47.s390", "3WS:krb5-server-0:1.2.7-47.s390x", "3WS:krb5-server-0:1.2.7-47.x86_64", "3WS:krb5-workstation-0:1.2.7-47.i386", "3WS:krb5-workstation-0:1.2.7-47.ia64", "3WS:krb5-workstation-0:1.2.7-47.ppc", "3WS:krb5-workstation-0:1.2.7-47.s390", "3WS:krb5-workstation-0:1.2.7-47.s390x", "3WS:krb5-workstation-0:1.2.7-47.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:562" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "the MIT Kerberos project", "Ga\u00ebl Delalleau" ] } ], "cve": "CVE-2005-0488", "discovery_date": "2005-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617531" } ], "notes": [ { "category": "description", "text": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:krb5-0:1.2.7-47.src", "3AS:krb5-debuginfo-0:1.2.7-47.i386", "3AS:krb5-debuginfo-0:1.2.7-47.ia64", "3AS:krb5-debuginfo-0:1.2.7-47.ppc", "3AS:krb5-debuginfo-0:1.2.7-47.ppc64", "3AS:krb5-debuginfo-0:1.2.7-47.s390", "3AS:krb5-debuginfo-0:1.2.7-47.s390x", "3AS:krb5-debuginfo-0:1.2.7-47.x86_64", "3AS:krb5-devel-0:1.2.7-47.i386", "3AS:krb5-devel-0:1.2.7-47.ia64", "3AS:krb5-devel-0:1.2.7-47.ppc", "3AS:krb5-devel-0:1.2.7-47.s390", "3AS:krb5-devel-0:1.2.7-47.s390x", "3AS:krb5-devel-0:1.2.7-47.x86_64", "3AS:krb5-libs-0:1.2.7-47.i386", "3AS:krb5-libs-0:1.2.7-47.ia64", "3AS:krb5-libs-0:1.2.7-47.ppc", "3AS:krb5-libs-0:1.2.7-47.ppc64", "3AS:krb5-libs-0:1.2.7-47.s390", "3AS:krb5-libs-0:1.2.7-47.s390x", "3AS:krb5-libs-0:1.2.7-47.x86_64", "3AS:krb5-server-0:1.2.7-47.i386", "3AS:krb5-server-0:1.2.7-47.ia64", "3AS:krb5-server-0:1.2.7-47.ppc", "3AS:krb5-server-0:1.2.7-47.s390", "3AS:krb5-server-0:1.2.7-47.s390x", "3AS:krb5-server-0:1.2.7-47.x86_64", "3AS:krb5-workstation-0:1.2.7-47.i386", "3AS:krb5-workstation-0:1.2.7-47.ia64", "3AS:krb5-workstation-0:1.2.7-47.ppc", "3AS:krb5-workstation-0:1.2.7-47.s390", "3AS:krb5-workstation-0:1.2.7-47.s390x", "3AS:krb5-workstation-0:1.2.7-47.x86_64", "3Desktop:krb5-0:1.2.7-47.src", "3Desktop:krb5-debuginfo-0:1.2.7-47.i386", "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64", "3Desktop:krb5-devel-0:1.2.7-47.i386", "3Desktop:krb5-devel-0:1.2.7-47.ia64", "3Desktop:krb5-devel-0:1.2.7-47.ppc", "3Desktop:krb5-devel-0:1.2.7-47.s390", "3Desktop:krb5-devel-0:1.2.7-47.s390x", "3Desktop:krb5-devel-0:1.2.7-47.x86_64", "3Desktop:krb5-libs-0:1.2.7-47.i386", "3Desktop:krb5-libs-0:1.2.7-47.ia64", "3Desktop:krb5-libs-0:1.2.7-47.ppc", "3Desktop:krb5-libs-0:1.2.7-47.ppc64", "3Desktop:krb5-libs-0:1.2.7-47.s390", "3Desktop:krb5-libs-0:1.2.7-47.s390x", "3Desktop:krb5-libs-0:1.2.7-47.x86_64", "3Desktop:krb5-server-0:1.2.7-47.i386", "3Desktop:krb5-server-0:1.2.7-47.ia64", "3Desktop:krb5-server-0:1.2.7-47.ppc", "3Desktop:krb5-server-0:1.2.7-47.s390", "3Desktop:krb5-server-0:1.2.7-47.s390x", "3Desktop:krb5-server-0:1.2.7-47.x86_64", "3Desktop:krb5-workstation-0:1.2.7-47.i386", "3Desktop:krb5-workstation-0:1.2.7-47.ia64", "3Desktop:krb5-workstation-0:1.2.7-47.ppc", "3Desktop:krb5-workstation-0:1.2.7-47.s390", "3Desktop:krb5-workstation-0:1.2.7-47.s390x", "3Desktop:krb5-workstation-0:1.2.7-47.x86_64", "3ES:krb5-0:1.2.7-47.src", "3ES:krb5-debuginfo-0:1.2.7-47.i386", "3ES:krb5-debuginfo-0:1.2.7-47.ia64", "3ES:krb5-debuginfo-0:1.2.7-47.ppc", "3ES:krb5-debuginfo-0:1.2.7-47.ppc64", "3ES:krb5-debuginfo-0:1.2.7-47.s390", "3ES:krb5-debuginfo-0:1.2.7-47.s390x", "3ES:krb5-debuginfo-0:1.2.7-47.x86_64", "3ES:krb5-devel-0:1.2.7-47.i386", "3ES:krb5-devel-0:1.2.7-47.ia64", "3ES:krb5-devel-0:1.2.7-47.ppc", "3ES:krb5-devel-0:1.2.7-47.s390", "3ES:krb5-devel-0:1.2.7-47.s390x", "3ES:krb5-devel-0:1.2.7-47.x86_64", "3ES:krb5-libs-0:1.2.7-47.i386", "3ES:krb5-libs-0:1.2.7-47.ia64", "3ES:krb5-libs-0:1.2.7-47.ppc", "3ES:krb5-libs-0:1.2.7-47.ppc64", "3ES:krb5-libs-0:1.2.7-47.s390", "3ES:krb5-libs-0:1.2.7-47.s390x", "3ES:krb5-libs-0:1.2.7-47.x86_64", "3ES:krb5-server-0:1.2.7-47.i386", "3ES:krb5-server-0:1.2.7-47.ia64", "3ES:krb5-server-0:1.2.7-47.ppc", "3ES:krb5-server-0:1.2.7-47.s390", "3ES:krb5-server-0:1.2.7-47.s390x", "3ES:krb5-server-0:1.2.7-47.x86_64", "3ES:krb5-workstation-0:1.2.7-47.i386", "3ES:krb5-workstation-0:1.2.7-47.ia64", "3ES:krb5-workstation-0:1.2.7-47.ppc", "3ES:krb5-workstation-0:1.2.7-47.s390", "3ES:krb5-workstation-0:1.2.7-47.s390x", "3ES:krb5-workstation-0:1.2.7-47.x86_64", "3WS:krb5-0:1.2.7-47.src", "3WS:krb5-debuginfo-0:1.2.7-47.i386", "3WS:krb5-debuginfo-0:1.2.7-47.ia64", "3WS:krb5-debuginfo-0:1.2.7-47.ppc", "3WS:krb5-debuginfo-0:1.2.7-47.ppc64", "3WS:krb5-debuginfo-0:1.2.7-47.s390", "3WS:krb5-debuginfo-0:1.2.7-47.s390x", "3WS:krb5-debuginfo-0:1.2.7-47.x86_64", "3WS:krb5-devel-0:1.2.7-47.i386", "3WS:krb5-devel-0:1.2.7-47.ia64", "3WS:krb5-devel-0:1.2.7-47.ppc", "3WS:krb5-devel-0:1.2.7-47.s390", "3WS:krb5-devel-0:1.2.7-47.s390x", "3WS:krb5-devel-0:1.2.7-47.x86_64", "3WS:krb5-libs-0:1.2.7-47.i386", "3WS:krb5-libs-0:1.2.7-47.ia64", "3WS:krb5-libs-0:1.2.7-47.ppc", "3WS:krb5-libs-0:1.2.7-47.ppc64", "3WS:krb5-libs-0:1.2.7-47.s390", "3WS:krb5-libs-0:1.2.7-47.s390x", "3WS:krb5-libs-0:1.2.7-47.x86_64", "3WS:krb5-server-0:1.2.7-47.i386", "3WS:krb5-server-0:1.2.7-47.ia64", "3WS:krb5-server-0:1.2.7-47.ppc", "3WS:krb5-server-0:1.2.7-47.s390", "3WS:krb5-server-0:1.2.7-47.s390x", "3WS:krb5-server-0:1.2.7-47.x86_64", "3WS:krb5-workstation-0:1.2.7-47.i386", "3WS:krb5-workstation-0:1.2.7-47.ia64", "3WS:krb5-workstation-0:1.2.7-47.ppc", "3WS:krb5-workstation-0:1.2.7-47.s390", "3WS:krb5-workstation-0:1.2.7-47.s390x", "3WS:krb5-workstation-0:1.2.7-47.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0488" }, { "category": "external", "summary": "RHBZ#1617531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617531" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0488", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0488" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0488", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0488" } ], "release_date": "2005-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-07-12T18:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:krb5-0:1.2.7-47.src", "3AS:krb5-debuginfo-0:1.2.7-47.i386", "3AS:krb5-debuginfo-0:1.2.7-47.ia64", "3AS:krb5-debuginfo-0:1.2.7-47.ppc", "3AS:krb5-debuginfo-0:1.2.7-47.ppc64", "3AS:krb5-debuginfo-0:1.2.7-47.s390", "3AS:krb5-debuginfo-0:1.2.7-47.s390x", "3AS:krb5-debuginfo-0:1.2.7-47.x86_64", "3AS:krb5-devel-0:1.2.7-47.i386", "3AS:krb5-devel-0:1.2.7-47.ia64", "3AS:krb5-devel-0:1.2.7-47.ppc", "3AS:krb5-devel-0:1.2.7-47.s390", "3AS:krb5-devel-0:1.2.7-47.s390x", "3AS:krb5-devel-0:1.2.7-47.x86_64", "3AS:krb5-libs-0:1.2.7-47.i386", "3AS:krb5-libs-0:1.2.7-47.ia64", "3AS:krb5-libs-0:1.2.7-47.ppc", "3AS:krb5-libs-0:1.2.7-47.ppc64", "3AS:krb5-libs-0:1.2.7-47.s390", "3AS:krb5-libs-0:1.2.7-47.s390x", "3AS:krb5-libs-0:1.2.7-47.x86_64", "3AS:krb5-server-0:1.2.7-47.i386", "3AS:krb5-server-0:1.2.7-47.ia64", "3AS:krb5-server-0:1.2.7-47.ppc", "3AS:krb5-server-0:1.2.7-47.s390", "3AS:krb5-server-0:1.2.7-47.s390x", "3AS:krb5-server-0:1.2.7-47.x86_64", "3AS:krb5-workstation-0:1.2.7-47.i386", "3AS:krb5-workstation-0:1.2.7-47.ia64", "3AS:krb5-workstation-0:1.2.7-47.ppc", "3AS:krb5-workstation-0:1.2.7-47.s390", "3AS:krb5-workstation-0:1.2.7-47.s390x", "3AS:krb5-workstation-0:1.2.7-47.x86_64", "3Desktop:krb5-0:1.2.7-47.src", "3Desktop:krb5-debuginfo-0:1.2.7-47.i386", "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64", "3Desktop:krb5-devel-0:1.2.7-47.i386", "3Desktop:krb5-devel-0:1.2.7-47.ia64", "3Desktop:krb5-devel-0:1.2.7-47.ppc", "3Desktop:krb5-devel-0:1.2.7-47.s390", "3Desktop:krb5-devel-0:1.2.7-47.s390x", "3Desktop:krb5-devel-0:1.2.7-47.x86_64", "3Desktop:krb5-libs-0:1.2.7-47.i386", "3Desktop:krb5-libs-0:1.2.7-47.ia64", "3Desktop:krb5-libs-0:1.2.7-47.ppc", "3Desktop:krb5-libs-0:1.2.7-47.ppc64", "3Desktop:krb5-libs-0:1.2.7-47.s390", "3Desktop:krb5-libs-0:1.2.7-47.s390x", "3Desktop:krb5-libs-0:1.2.7-47.x86_64", "3Desktop:krb5-server-0:1.2.7-47.i386", "3Desktop:krb5-server-0:1.2.7-47.ia64", "3Desktop:krb5-server-0:1.2.7-47.ppc", "3Desktop:krb5-server-0:1.2.7-47.s390", "3Desktop:krb5-server-0:1.2.7-47.s390x", "3Desktop:krb5-server-0:1.2.7-47.x86_64", "3Desktop:krb5-workstation-0:1.2.7-47.i386", "3Desktop:krb5-workstation-0:1.2.7-47.ia64", "3Desktop:krb5-workstation-0:1.2.7-47.ppc", "3Desktop:krb5-workstation-0:1.2.7-47.s390", "3Desktop:krb5-workstation-0:1.2.7-47.s390x", "3Desktop:krb5-workstation-0:1.2.7-47.x86_64", "3ES:krb5-0:1.2.7-47.src", "3ES:krb5-debuginfo-0:1.2.7-47.i386", "3ES:krb5-debuginfo-0:1.2.7-47.ia64", "3ES:krb5-debuginfo-0:1.2.7-47.ppc", "3ES:krb5-debuginfo-0:1.2.7-47.ppc64", "3ES:krb5-debuginfo-0:1.2.7-47.s390", "3ES:krb5-debuginfo-0:1.2.7-47.s390x", "3ES:krb5-debuginfo-0:1.2.7-47.x86_64", "3ES:krb5-devel-0:1.2.7-47.i386", "3ES:krb5-devel-0:1.2.7-47.ia64", "3ES:krb5-devel-0:1.2.7-47.ppc", "3ES:krb5-devel-0:1.2.7-47.s390", "3ES:krb5-devel-0:1.2.7-47.s390x", "3ES:krb5-devel-0:1.2.7-47.x86_64", "3ES:krb5-libs-0:1.2.7-47.i386", "3ES:krb5-libs-0:1.2.7-47.ia64", "3ES:krb5-libs-0:1.2.7-47.ppc", "3ES:krb5-libs-0:1.2.7-47.ppc64", "3ES:krb5-libs-0:1.2.7-47.s390", "3ES:krb5-libs-0:1.2.7-47.s390x", "3ES:krb5-libs-0:1.2.7-47.x86_64", "3ES:krb5-server-0:1.2.7-47.i386", "3ES:krb5-server-0:1.2.7-47.ia64", "3ES:krb5-server-0:1.2.7-47.ppc", "3ES:krb5-server-0:1.2.7-47.s390", "3ES:krb5-server-0:1.2.7-47.s390x", "3ES:krb5-server-0:1.2.7-47.x86_64", "3ES:krb5-workstation-0:1.2.7-47.i386", "3ES:krb5-workstation-0:1.2.7-47.ia64", "3ES:krb5-workstation-0:1.2.7-47.ppc", "3ES:krb5-workstation-0:1.2.7-47.s390", "3ES:krb5-workstation-0:1.2.7-47.s390x", "3ES:krb5-workstation-0:1.2.7-47.x86_64", "3WS:krb5-0:1.2.7-47.src", "3WS:krb5-debuginfo-0:1.2.7-47.i386", "3WS:krb5-debuginfo-0:1.2.7-47.ia64", "3WS:krb5-debuginfo-0:1.2.7-47.ppc", "3WS:krb5-debuginfo-0:1.2.7-47.ppc64", "3WS:krb5-debuginfo-0:1.2.7-47.s390", "3WS:krb5-debuginfo-0:1.2.7-47.s390x", "3WS:krb5-debuginfo-0:1.2.7-47.x86_64", "3WS:krb5-devel-0:1.2.7-47.i386", "3WS:krb5-devel-0:1.2.7-47.ia64", "3WS:krb5-devel-0:1.2.7-47.ppc", "3WS:krb5-devel-0:1.2.7-47.s390", "3WS:krb5-devel-0:1.2.7-47.s390x", "3WS:krb5-devel-0:1.2.7-47.x86_64", "3WS:krb5-libs-0:1.2.7-47.i386", "3WS:krb5-libs-0:1.2.7-47.ia64", "3WS:krb5-libs-0:1.2.7-47.ppc", "3WS:krb5-libs-0:1.2.7-47.ppc64", "3WS:krb5-libs-0:1.2.7-47.s390", "3WS:krb5-libs-0:1.2.7-47.s390x", "3WS:krb5-libs-0:1.2.7-47.x86_64", "3WS:krb5-server-0:1.2.7-47.i386", "3WS:krb5-server-0:1.2.7-47.ia64", "3WS:krb5-server-0:1.2.7-47.ppc", "3WS:krb5-server-0:1.2.7-47.s390", "3WS:krb5-server-0:1.2.7-47.s390x", "3WS:krb5-server-0:1.2.7-47.x86_64", "3WS:krb5-workstation-0:1.2.7-47.i386", "3WS:krb5-workstation-0:1.2.7-47.ia64", "3WS:krb5-workstation-0:1.2.7-47.ppc", "3WS:krb5-workstation-0:1.2.7-47.s390", "3WS:krb5-workstation-0:1.2.7-47.s390x", "3WS:krb5-workstation-0:1.2.7-47.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:562" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "the MIT Kerberos project", "Daniel Wachdorf" ] } ], "cve": "CVE-2005-1175", "discovery_date": "2005-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617614" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:krb5-0:1.2.7-47.src", "3AS:krb5-debuginfo-0:1.2.7-47.i386", "3AS:krb5-debuginfo-0:1.2.7-47.ia64", "3AS:krb5-debuginfo-0:1.2.7-47.ppc", "3AS:krb5-debuginfo-0:1.2.7-47.ppc64", "3AS:krb5-debuginfo-0:1.2.7-47.s390", "3AS:krb5-debuginfo-0:1.2.7-47.s390x", "3AS:krb5-debuginfo-0:1.2.7-47.x86_64", "3AS:krb5-devel-0:1.2.7-47.i386", "3AS:krb5-devel-0:1.2.7-47.ia64", "3AS:krb5-devel-0:1.2.7-47.ppc", "3AS:krb5-devel-0:1.2.7-47.s390", "3AS:krb5-devel-0:1.2.7-47.s390x", "3AS:krb5-devel-0:1.2.7-47.x86_64", "3AS:krb5-libs-0:1.2.7-47.i386", "3AS:krb5-libs-0:1.2.7-47.ia64", "3AS:krb5-libs-0:1.2.7-47.ppc", "3AS:krb5-libs-0:1.2.7-47.ppc64", "3AS:krb5-libs-0:1.2.7-47.s390", "3AS:krb5-libs-0:1.2.7-47.s390x", "3AS:krb5-libs-0:1.2.7-47.x86_64", "3AS:krb5-server-0:1.2.7-47.i386", "3AS:krb5-server-0:1.2.7-47.ia64", "3AS:krb5-server-0:1.2.7-47.ppc", "3AS:krb5-server-0:1.2.7-47.s390", "3AS:krb5-server-0:1.2.7-47.s390x", "3AS:krb5-server-0:1.2.7-47.x86_64", "3AS:krb5-workstation-0:1.2.7-47.i386", "3AS:krb5-workstation-0:1.2.7-47.ia64", "3AS:krb5-workstation-0:1.2.7-47.ppc", "3AS:krb5-workstation-0:1.2.7-47.s390", "3AS:krb5-workstation-0:1.2.7-47.s390x", "3AS:krb5-workstation-0:1.2.7-47.x86_64", "3Desktop:krb5-0:1.2.7-47.src", "3Desktop:krb5-debuginfo-0:1.2.7-47.i386", "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64", "3Desktop:krb5-devel-0:1.2.7-47.i386", "3Desktop:krb5-devel-0:1.2.7-47.ia64", "3Desktop:krb5-devel-0:1.2.7-47.ppc", "3Desktop:krb5-devel-0:1.2.7-47.s390", "3Desktop:krb5-devel-0:1.2.7-47.s390x", "3Desktop:krb5-devel-0:1.2.7-47.x86_64", "3Desktop:krb5-libs-0:1.2.7-47.i386", "3Desktop:krb5-libs-0:1.2.7-47.ia64", "3Desktop:krb5-libs-0:1.2.7-47.ppc", "3Desktop:krb5-libs-0:1.2.7-47.ppc64", "3Desktop:krb5-libs-0:1.2.7-47.s390", "3Desktop:krb5-libs-0:1.2.7-47.s390x", "3Desktop:krb5-libs-0:1.2.7-47.x86_64", "3Desktop:krb5-server-0:1.2.7-47.i386", "3Desktop:krb5-server-0:1.2.7-47.ia64", "3Desktop:krb5-server-0:1.2.7-47.ppc", "3Desktop:krb5-server-0:1.2.7-47.s390", "3Desktop:krb5-server-0:1.2.7-47.s390x", "3Desktop:krb5-server-0:1.2.7-47.x86_64", "3Desktop:krb5-workstation-0:1.2.7-47.i386", "3Desktop:krb5-workstation-0:1.2.7-47.ia64", "3Desktop:krb5-workstation-0:1.2.7-47.ppc", "3Desktop:krb5-workstation-0:1.2.7-47.s390", "3Desktop:krb5-workstation-0:1.2.7-47.s390x", "3Desktop:krb5-workstation-0:1.2.7-47.x86_64", "3ES:krb5-0:1.2.7-47.src", "3ES:krb5-debuginfo-0:1.2.7-47.i386", "3ES:krb5-debuginfo-0:1.2.7-47.ia64", "3ES:krb5-debuginfo-0:1.2.7-47.ppc", "3ES:krb5-debuginfo-0:1.2.7-47.ppc64", "3ES:krb5-debuginfo-0:1.2.7-47.s390", "3ES:krb5-debuginfo-0:1.2.7-47.s390x", "3ES:krb5-debuginfo-0:1.2.7-47.x86_64", "3ES:krb5-devel-0:1.2.7-47.i386", "3ES:krb5-devel-0:1.2.7-47.ia64", "3ES:krb5-devel-0:1.2.7-47.ppc", "3ES:krb5-devel-0:1.2.7-47.s390", "3ES:krb5-devel-0:1.2.7-47.s390x", "3ES:krb5-devel-0:1.2.7-47.x86_64", "3ES:krb5-libs-0:1.2.7-47.i386", "3ES:krb5-libs-0:1.2.7-47.ia64", "3ES:krb5-libs-0:1.2.7-47.ppc", "3ES:krb5-libs-0:1.2.7-47.ppc64", "3ES:krb5-libs-0:1.2.7-47.s390", "3ES:krb5-libs-0:1.2.7-47.s390x", "3ES:krb5-libs-0:1.2.7-47.x86_64", "3ES:krb5-server-0:1.2.7-47.i386", "3ES:krb5-server-0:1.2.7-47.ia64", "3ES:krb5-server-0:1.2.7-47.ppc", "3ES:krb5-server-0:1.2.7-47.s390", "3ES:krb5-server-0:1.2.7-47.s390x", "3ES:krb5-server-0:1.2.7-47.x86_64", "3ES:krb5-workstation-0:1.2.7-47.i386", "3ES:krb5-workstation-0:1.2.7-47.ia64", "3ES:krb5-workstation-0:1.2.7-47.ppc", "3ES:krb5-workstation-0:1.2.7-47.s390", "3ES:krb5-workstation-0:1.2.7-47.s390x", "3ES:krb5-workstation-0:1.2.7-47.x86_64", "3WS:krb5-0:1.2.7-47.src", "3WS:krb5-debuginfo-0:1.2.7-47.i386", "3WS:krb5-debuginfo-0:1.2.7-47.ia64", "3WS:krb5-debuginfo-0:1.2.7-47.ppc", "3WS:krb5-debuginfo-0:1.2.7-47.ppc64", "3WS:krb5-debuginfo-0:1.2.7-47.s390", "3WS:krb5-debuginfo-0:1.2.7-47.s390x", "3WS:krb5-debuginfo-0:1.2.7-47.x86_64", "3WS:krb5-devel-0:1.2.7-47.i386", "3WS:krb5-devel-0:1.2.7-47.ia64", "3WS:krb5-devel-0:1.2.7-47.ppc", "3WS:krb5-devel-0:1.2.7-47.s390", "3WS:krb5-devel-0:1.2.7-47.s390x", "3WS:krb5-devel-0:1.2.7-47.x86_64", "3WS:krb5-libs-0:1.2.7-47.i386", "3WS:krb5-libs-0:1.2.7-47.ia64", "3WS:krb5-libs-0:1.2.7-47.ppc", "3WS:krb5-libs-0:1.2.7-47.ppc64", "3WS:krb5-libs-0:1.2.7-47.s390", "3WS:krb5-libs-0:1.2.7-47.s390x", "3WS:krb5-libs-0:1.2.7-47.x86_64", "3WS:krb5-server-0:1.2.7-47.i386", "3WS:krb5-server-0:1.2.7-47.ia64", "3WS:krb5-server-0:1.2.7-47.ppc", "3WS:krb5-server-0:1.2.7-47.s390", "3WS:krb5-server-0:1.2.7-47.s390x", "3WS:krb5-server-0:1.2.7-47.x86_64", "3WS:krb5-workstation-0:1.2.7-47.i386", "3WS:krb5-workstation-0:1.2.7-47.ia64", "3WS:krb5-workstation-0:1.2.7-47.ppc", "3WS:krb5-workstation-0:1.2.7-47.s390", "3WS:krb5-workstation-0:1.2.7-47.s390x", "3WS:krb5-workstation-0:1.2.7-47.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1175" }, { "category": "external", "summary": "RHBZ#1617614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617614" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1175", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1175" } ], "release_date": "2005-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-07-12T18:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:krb5-0:1.2.7-47.src", "3AS:krb5-debuginfo-0:1.2.7-47.i386", "3AS:krb5-debuginfo-0:1.2.7-47.ia64", "3AS:krb5-debuginfo-0:1.2.7-47.ppc", "3AS:krb5-debuginfo-0:1.2.7-47.ppc64", "3AS:krb5-debuginfo-0:1.2.7-47.s390", "3AS:krb5-debuginfo-0:1.2.7-47.s390x", "3AS:krb5-debuginfo-0:1.2.7-47.x86_64", "3AS:krb5-devel-0:1.2.7-47.i386", "3AS:krb5-devel-0:1.2.7-47.ia64", "3AS:krb5-devel-0:1.2.7-47.ppc", "3AS:krb5-devel-0:1.2.7-47.s390", "3AS:krb5-devel-0:1.2.7-47.s390x", "3AS:krb5-devel-0:1.2.7-47.x86_64", "3AS:krb5-libs-0:1.2.7-47.i386", "3AS:krb5-libs-0:1.2.7-47.ia64", "3AS:krb5-libs-0:1.2.7-47.ppc", "3AS:krb5-libs-0:1.2.7-47.ppc64", "3AS:krb5-libs-0:1.2.7-47.s390", "3AS:krb5-libs-0:1.2.7-47.s390x", "3AS:krb5-libs-0:1.2.7-47.x86_64", "3AS:krb5-server-0:1.2.7-47.i386", "3AS:krb5-server-0:1.2.7-47.ia64", "3AS:krb5-server-0:1.2.7-47.ppc", "3AS:krb5-server-0:1.2.7-47.s390", "3AS:krb5-server-0:1.2.7-47.s390x", "3AS:krb5-server-0:1.2.7-47.x86_64", "3AS:krb5-workstation-0:1.2.7-47.i386", "3AS:krb5-workstation-0:1.2.7-47.ia64", "3AS:krb5-workstation-0:1.2.7-47.ppc", "3AS:krb5-workstation-0:1.2.7-47.s390", "3AS:krb5-workstation-0:1.2.7-47.s390x", "3AS:krb5-workstation-0:1.2.7-47.x86_64", "3Desktop:krb5-0:1.2.7-47.src", "3Desktop:krb5-debuginfo-0:1.2.7-47.i386", "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64", "3Desktop:krb5-devel-0:1.2.7-47.i386", "3Desktop:krb5-devel-0:1.2.7-47.ia64", "3Desktop:krb5-devel-0:1.2.7-47.ppc", "3Desktop:krb5-devel-0:1.2.7-47.s390", "3Desktop:krb5-devel-0:1.2.7-47.s390x", "3Desktop:krb5-devel-0:1.2.7-47.x86_64", "3Desktop:krb5-libs-0:1.2.7-47.i386", "3Desktop:krb5-libs-0:1.2.7-47.ia64", "3Desktop:krb5-libs-0:1.2.7-47.ppc", "3Desktop:krb5-libs-0:1.2.7-47.ppc64", "3Desktop:krb5-libs-0:1.2.7-47.s390", "3Desktop:krb5-libs-0:1.2.7-47.s390x", "3Desktop:krb5-libs-0:1.2.7-47.x86_64", "3Desktop:krb5-server-0:1.2.7-47.i386", "3Desktop:krb5-server-0:1.2.7-47.ia64", "3Desktop:krb5-server-0:1.2.7-47.ppc", "3Desktop:krb5-server-0:1.2.7-47.s390", "3Desktop:krb5-server-0:1.2.7-47.s390x", "3Desktop:krb5-server-0:1.2.7-47.x86_64", "3Desktop:krb5-workstation-0:1.2.7-47.i386", "3Desktop:krb5-workstation-0:1.2.7-47.ia64", "3Desktop:krb5-workstation-0:1.2.7-47.ppc", "3Desktop:krb5-workstation-0:1.2.7-47.s390", "3Desktop:krb5-workstation-0:1.2.7-47.s390x", "3Desktop:krb5-workstation-0:1.2.7-47.x86_64", "3ES:krb5-0:1.2.7-47.src", "3ES:krb5-debuginfo-0:1.2.7-47.i386", "3ES:krb5-debuginfo-0:1.2.7-47.ia64", "3ES:krb5-debuginfo-0:1.2.7-47.ppc", "3ES:krb5-debuginfo-0:1.2.7-47.ppc64", "3ES:krb5-debuginfo-0:1.2.7-47.s390", "3ES:krb5-debuginfo-0:1.2.7-47.s390x", "3ES:krb5-debuginfo-0:1.2.7-47.x86_64", "3ES:krb5-devel-0:1.2.7-47.i386", "3ES:krb5-devel-0:1.2.7-47.ia64", "3ES:krb5-devel-0:1.2.7-47.ppc", "3ES:krb5-devel-0:1.2.7-47.s390", "3ES:krb5-devel-0:1.2.7-47.s390x", "3ES:krb5-devel-0:1.2.7-47.x86_64", "3ES:krb5-libs-0:1.2.7-47.i386", "3ES:krb5-libs-0:1.2.7-47.ia64", "3ES:krb5-libs-0:1.2.7-47.ppc", "3ES:krb5-libs-0:1.2.7-47.ppc64", "3ES:krb5-libs-0:1.2.7-47.s390", "3ES:krb5-libs-0:1.2.7-47.s390x", "3ES:krb5-libs-0:1.2.7-47.x86_64", "3ES:krb5-server-0:1.2.7-47.i386", "3ES:krb5-server-0:1.2.7-47.ia64", "3ES:krb5-server-0:1.2.7-47.ppc", "3ES:krb5-server-0:1.2.7-47.s390", "3ES:krb5-server-0:1.2.7-47.s390x", "3ES:krb5-server-0:1.2.7-47.x86_64", "3ES:krb5-workstation-0:1.2.7-47.i386", "3ES:krb5-workstation-0:1.2.7-47.ia64", "3ES:krb5-workstation-0:1.2.7-47.ppc", "3ES:krb5-workstation-0:1.2.7-47.s390", "3ES:krb5-workstation-0:1.2.7-47.s390x", "3ES:krb5-workstation-0:1.2.7-47.x86_64", "3WS:krb5-0:1.2.7-47.src", "3WS:krb5-debuginfo-0:1.2.7-47.i386", "3WS:krb5-debuginfo-0:1.2.7-47.ia64", "3WS:krb5-debuginfo-0:1.2.7-47.ppc", "3WS:krb5-debuginfo-0:1.2.7-47.ppc64", "3WS:krb5-debuginfo-0:1.2.7-47.s390", "3WS:krb5-debuginfo-0:1.2.7-47.s390x", "3WS:krb5-debuginfo-0:1.2.7-47.x86_64", "3WS:krb5-devel-0:1.2.7-47.i386", "3WS:krb5-devel-0:1.2.7-47.ia64", "3WS:krb5-devel-0:1.2.7-47.ppc", "3WS:krb5-devel-0:1.2.7-47.s390", "3WS:krb5-devel-0:1.2.7-47.s390x", "3WS:krb5-devel-0:1.2.7-47.x86_64", "3WS:krb5-libs-0:1.2.7-47.i386", "3WS:krb5-libs-0:1.2.7-47.ia64", "3WS:krb5-libs-0:1.2.7-47.ppc", "3WS:krb5-libs-0:1.2.7-47.ppc64", "3WS:krb5-libs-0:1.2.7-47.s390", "3WS:krb5-libs-0:1.2.7-47.s390x", "3WS:krb5-libs-0:1.2.7-47.x86_64", "3WS:krb5-server-0:1.2.7-47.i386", "3WS:krb5-server-0:1.2.7-47.ia64", "3WS:krb5-server-0:1.2.7-47.ppc", "3WS:krb5-server-0:1.2.7-47.s390", "3WS:krb5-server-0:1.2.7-47.s390x", "3WS:krb5-server-0:1.2.7-47.x86_64", "3WS:krb5-workstation-0:1.2.7-47.i386", "3WS:krb5-workstation-0:1.2.7-47.ia64", "3WS:krb5-workstation-0:1.2.7-47.ppc", "3WS:krb5-workstation-0:1.2.7-47.s390", "3WS:krb5-workstation-0:1.2.7-47.s390x", "3WS:krb5-workstation-0:1.2.7-47.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:562" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "the MIT Kerberos project" ] } ], "cve": "CVE-2005-1689", "discovery_date": "2005-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617659" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:krb5-0:1.2.7-47.src", "3AS:krb5-debuginfo-0:1.2.7-47.i386", "3AS:krb5-debuginfo-0:1.2.7-47.ia64", "3AS:krb5-debuginfo-0:1.2.7-47.ppc", "3AS:krb5-debuginfo-0:1.2.7-47.ppc64", "3AS:krb5-debuginfo-0:1.2.7-47.s390", "3AS:krb5-debuginfo-0:1.2.7-47.s390x", "3AS:krb5-debuginfo-0:1.2.7-47.x86_64", "3AS:krb5-devel-0:1.2.7-47.i386", "3AS:krb5-devel-0:1.2.7-47.ia64", "3AS:krb5-devel-0:1.2.7-47.ppc", "3AS:krb5-devel-0:1.2.7-47.s390", "3AS:krb5-devel-0:1.2.7-47.s390x", "3AS:krb5-devel-0:1.2.7-47.x86_64", "3AS:krb5-libs-0:1.2.7-47.i386", "3AS:krb5-libs-0:1.2.7-47.ia64", "3AS:krb5-libs-0:1.2.7-47.ppc", "3AS:krb5-libs-0:1.2.7-47.ppc64", "3AS:krb5-libs-0:1.2.7-47.s390", "3AS:krb5-libs-0:1.2.7-47.s390x", "3AS:krb5-libs-0:1.2.7-47.x86_64", "3AS:krb5-server-0:1.2.7-47.i386", "3AS:krb5-server-0:1.2.7-47.ia64", "3AS:krb5-server-0:1.2.7-47.ppc", "3AS:krb5-server-0:1.2.7-47.s390", "3AS:krb5-server-0:1.2.7-47.s390x", "3AS:krb5-server-0:1.2.7-47.x86_64", "3AS:krb5-workstation-0:1.2.7-47.i386", "3AS:krb5-workstation-0:1.2.7-47.ia64", "3AS:krb5-workstation-0:1.2.7-47.ppc", "3AS:krb5-workstation-0:1.2.7-47.s390", "3AS:krb5-workstation-0:1.2.7-47.s390x", "3AS:krb5-workstation-0:1.2.7-47.x86_64", "3Desktop:krb5-0:1.2.7-47.src", "3Desktop:krb5-debuginfo-0:1.2.7-47.i386", "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64", "3Desktop:krb5-devel-0:1.2.7-47.i386", "3Desktop:krb5-devel-0:1.2.7-47.ia64", "3Desktop:krb5-devel-0:1.2.7-47.ppc", "3Desktop:krb5-devel-0:1.2.7-47.s390", "3Desktop:krb5-devel-0:1.2.7-47.s390x", "3Desktop:krb5-devel-0:1.2.7-47.x86_64", "3Desktop:krb5-libs-0:1.2.7-47.i386", "3Desktop:krb5-libs-0:1.2.7-47.ia64", "3Desktop:krb5-libs-0:1.2.7-47.ppc", "3Desktop:krb5-libs-0:1.2.7-47.ppc64", "3Desktop:krb5-libs-0:1.2.7-47.s390", "3Desktop:krb5-libs-0:1.2.7-47.s390x", "3Desktop:krb5-libs-0:1.2.7-47.x86_64", "3Desktop:krb5-server-0:1.2.7-47.i386", "3Desktop:krb5-server-0:1.2.7-47.ia64", "3Desktop:krb5-server-0:1.2.7-47.ppc", "3Desktop:krb5-server-0:1.2.7-47.s390", "3Desktop:krb5-server-0:1.2.7-47.s390x", "3Desktop:krb5-server-0:1.2.7-47.x86_64", "3Desktop:krb5-workstation-0:1.2.7-47.i386", "3Desktop:krb5-workstation-0:1.2.7-47.ia64", "3Desktop:krb5-workstation-0:1.2.7-47.ppc", "3Desktop:krb5-workstation-0:1.2.7-47.s390", "3Desktop:krb5-workstation-0:1.2.7-47.s390x", "3Desktop:krb5-workstation-0:1.2.7-47.x86_64", "3ES:krb5-0:1.2.7-47.src", "3ES:krb5-debuginfo-0:1.2.7-47.i386", "3ES:krb5-debuginfo-0:1.2.7-47.ia64", "3ES:krb5-debuginfo-0:1.2.7-47.ppc", "3ES:krb5-debuginfo-0:1.2.7-47.ppc64", "3ES:krb5-debuginfo-0:1.2.7-47.s390", "3ES:krb5-debuginfo-0:1.2.7-47.s390x", "3ES:krb5-debuginfo-0:1.2.7-47.x86_64", "3ES:krb5-devel-0:1.2.7-47.i386", "3ES:krb5-devel-0:1.2.7-47.ia64", "3ES:krb5-devel-0:1.2.7-47.ppc", "3ES:krb5-devel-0:1.2.7-47.s390", "3ES:krb5-devel-0:1.2.7-47.s390x", "3ES:krb5-devel-0:1.2.7-47.x86_64", "3ES:krb5-libs-0:1.2.7-47.i386", "3ES:krb5-libs-0:1.2.7-47.ia64", "3ES:krb5-libs-0:1.2.7-47.ppc", "3ES:krb5-libs-0:1.2.7-47.ppc64", "3ES:krb5-libs-0:1.2.7-47.s390", "3ES:krb5-libs-0:1.2.7-47.s390x", "3ES:krb5-libs-0:1.2.7-47.x86_64", "3ES:krb5-server-0:1.2.7-47.i386", "3ES:krb5-server-0:1.2.7-47.ia64", "3ES:krb5-server-0:1.2.7-47.ppc", "3ES:krb5-server-0:1.2.7-47.s390", "3ES:krb5-server-0:1.2.7-47.s390x", "3ES:krb5-server-0:1.2.7-47.x86_64", "3ES:krb5-workstation-0:1.2.7-47.i386", "3ES:krb5-workstation-0:1.2.7-47.ia64", "3ES:krb5-workstation-0:1.2.7-47.ppc", "3ES:krb5-workstation-0:1.2.7-47.s390", "3ES:krb5-workstation-0:1.2.7-47.s390x", "3ES:krb5-workstation-0:1.2.7-47.x86_64", "3WS:krb5-0:1.2.7-47.src", "3WS:krb5-debuginfo-0:1.2.7-47.i386", "3WS:krb5-debuginfo-0:1.2.7-47.ia64", "3WS:krb5-debuginfo-0:1.2.7-47.ppc", "3WS:krb5-debuginfo-0:1.2.7-47.ppc64", "3WS:krb5-debuginfo-0:1.2.7-47.s390", "3WS:krb5-debuginfo-0:1.2.7-47.s390x", "3WS:krb5-debuginfo-0:1.2.7-47.x86_64", "3WS:krb5-devel-0:1.2.7-47.i386", "3WS:krb5-devel-0:1.2.7-47.ia64", "3WS:krb5-devel-0:1.2.7-47.ppc", "3WS:krb5-devel-0:1.2.7-47.s390", "3WS:krb5-devel-0:1.2.7-47.s390x", "3WS:krb5-devel-0:1.2.7-47.x86_64", "3WS:krb5-libs-0:1.2.7-47.i386", "3WS:krb5-libs-0:1.2.7-47.ia64", "3WS:krb5-libs-0:1.2.7-47.ppc", "3WS:krb5-libs-0:1.2.7-47.ppc64", "3WS:krb5-libs-0:1.2.7-47.s390", "3WS:krb5-libs-0:1.2.7-47.s390x", "3WS:krb5-libs-0:1.2.7-47.x86_64", "3WS:krb5-server-0:1.2.7-47.i386", "3WS:krb5-server-0:1.2.7-47.ia64", "3WS:krb5-server-0:1.2.7-47.ppc", "3WS:krb5-server-0:1.2.7-47.s390", "3WS:krb5-server-0:1.2.7-47.s390x", "3WS:krb5-server-0:1.2.7-47.x86_64", "3WS:krb5-workstation-0:1.2.7-47.i386", "3WS:krb5-workstation-0:1.2.7-47.ia64", "3WS:krb5-workstation-0:1.2.7-47.ppc", "3WS:krb5-workstation-0:1.2.7-47.s390", "3WS:krb5-workstation-0:1.2.7-47.s390x", "3WS:krb5-workstation-0:1.2.7-47.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1689" }, { "category": "external", "summary": "RHBZ#1617659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1689", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1689" } ], "release_date": "2005-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-07-12T18:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:krb5-0:1.2.7-47.src", "3AS:krb5-debuginfo-0:1.2.7-47.i386", "3AS:krb5-debuginfo-0:1.2.7-47.ia64", "3AS:krb5-debuginfo-0:1.2.7-47.ppc", "3AS:krb5-debuginfo-0:1.2.7-47.ppc64", "3AS:krb5-debuginfo-0:1.2.7-47.s390", "3AS:krb5-debuginfo-0:1.2.7-47.s390x", "3AS:krb5-debuginfo-0:1.2.7-47.x86_64", "3AS:krb5-devel-0:1.2.7-47.i386", "3AS:krb5-devel-0:1.2.7-47.ia64", "3AS:krb5-devel-0:1.2.7-47.ppc", "3AS:krb5-devel-0:1.2.7-47.s390", "3AS:krb5-devel-0:1.2.7-47.s390x", "3AS:krb5-devel-0:1.2.7-47.x86_64", "3AS:krb5-libs-0:1.2.7-47.i386", "3AS:krb5-libs-0:1.2.7-47.ia64", "3AS:krb5-libs-0:1.2.7-47.ppc", "3AS:krb5-libs-0:1.2.7-47.ppc64", "3AS:krb5-libs-0:1.2.7-47.s390", "3AS:krb5-libs-0:1.2.7-47.s390x", "3AS:krb5-libs-0:1.2.7-47.x86_64", "3AS:krb5-server-0:1.2.7-47.i386", "3AS:krb5-server-0:1.2.7-47.ia64", "3AS:krb5-server-0:1.2.7-47.ppc", "3AS:krb5-server-0:1.2.7-47.s390", "3AS:krb5-server-0:1.2.7-47.s390x", "3AS:krb5-server-0:1.2.7-47.x86_64", "3AS:krb5-workstation-0:1.2.7-47.i386", "3AS:krb5-workstation-0:1.2.7-47.ia64", "3AS:krb5-workstation-0:1.2.7-47.ppc", "3AS:krb5-workstation-0:1.2.7-47.s390", "3AS:krb5-workstation-0:1.2.7-47.s390x", "3AS:krb5-workstation-0:1.2.7-47.x86_64", "3Desktop:krb5-0:1.2.7-47.src", "3Desktop:krb5-debuginfo-0:1.2.7-47.i386", "3Desktop:krb5-debuginfo-0:1.2.7-47.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-47.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390", "3Desktop:krb5-debuginfo-0:1.2.7-47.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-47.x86_64", "3Desktop:krb5-devel-0:1.2.7-47.i386", "3Desktop:krb5-devel-0:1.2.7-47.ia64", "3Desktop:krb5-devel-0:1.2.7-47.ppc", "3Desktop:krb5-devel-0:1.2.7-47.s390", "3Desktop:krb5-devel-0:1.2.7-47.s390x", "3Desktop:krb5-devel-0:1.2.7-47.x86_64", "3Desktop:krb5-libs-0:1.2.7-47.i386", "3Desktop:krb5-libs-0:1.2.7-47.ia64", "3Desktop:krb5-libs-0:1.2.7-47.ppc", "3Desktop:krb5-libs-0:1.2.7-47.ppc64", "3Desktop:krb5-libs-0:1.2.7-47.s390", "3Desktop:krb5-libs-0:1.2.7-47.s390x", "3Desktop:krb5-libs-0:1.2.7-47.x86_64", "3Desktop:krb5-server-0:1.2.7-47.i386", "3Desktop:krb5-server-0:1.2.7-47.ia64", "3Desktop:krb5-server-0:1.2.7-47.ppc", "3Desktop:krb5-server-0:1.2.7-47.s390", "3Desktop:krb5-server-0:1.2.7-47.s390x", "3Desktop:krb5-server-0:1.2.7-47.x86_64", "3Desktop:krb5-workstation-0:1.2.7-47.i386", "3Desktop:krb5-workstation-0:1.2.7-47.ia64", "3Desktop:krb5-workstation-0:1.2.7-47.ppc", "3Desktop:krb5-workstation-0:1.2.7-47.s390", "3Desktop:krb5-workstation-0:1.2.7-47.s390x", "3Desktop:krb5-workstation-0:1.2.7-47.x86_64", "3ES:krb5-0:1.2.7-47.src", "3ES:krb5-debuginfo-0:1.2.7-47.i386", "3ES:krb5-debuginfo-0:1.2.7-47.ia64", "3ES:krb5-debuginfo-0:1.2.7-47.ppc", "3ES:krb5-debuginfo-0:1.2.7-47.ppc64", "3ES:krb5-debuginfo-0:1.2.7-47.s390", "3ES:krb5-debuginfo-0:1.2.7-47.s390x", "3ES:krb5-debuginfo-0:1.2.7-47.x86_64", "3ES:krb5-devel-0:1.2.7-47.i386", "3ES:krb5-devel-0:1.2.7-47.ia64", "3ES:krb5-devel-0:1.2.7-47.ppc", "3ES:krb5-devel-0:1.2.7-47.s390", "3ES:krb5-devel-0:1.2.7-47.s390x", "3ES:krb5-devel-0:1.2.7-47.x86_64", "3ES:krb5-libs-0:1.2.7-47.i386", "3ES:krb5-libs-0:1.2.7-47.ia64", "3ES:krb5-libs-0:1.2.7-47.ppc", "3ES:krb5-libs-0:1.2.7-47.ppc64", "3ES:krb5-libs-0:1.2.7-47.s390", "3ES:krb5-libs-0:1.2.7-47.s390x", "3ES:krb5-libs-0:1.2.7-47.x86_64", "3ES:krb5-server-0:1.2.7-47.i386", "3ES:krb5-server-0:1.2.7-47.ia64", "3ES:krb5-server-0:1.2.7-47.ppc", "3ES:krb5-server-0:1.2.7-47.s390", "3ES:krb5-server-0:1.2.7-47.s390x", "3ES:krb5-server-0:1.2.7-47.x86_64", "3ES:krb5-workstation-0:1.2.7-47.i386", "3ES:krb5-workstation-0:1.2.7-47.ia64", "3ES:krb5-workstation-0:1.2.7-47.ppc", "3ES:krb5-workstation-0:1.2.7-47.s390", "3ES:krb5-workstation-0:1.2.7-47.s390x", "3ES:krb5-workstation-0:1.2.7-47.x86_64", "3WS:krb5-0:1.2.7-47.src", "3WS:krb5-debuginfo-0:1.2.7-47.i386", "3WS:krb5-debuginfo-0:1.2.7-47.ia64", "3WS:krb5-debuginfo-0:1.2.7-47.ppc", "3WS:krb5-debuginfo-0:1.2.7-47.ppc64", "3WS:krb5-debuginfo-0:1.2.7-47.s390", "3WS:krb5-debuginfo-0:1.2.7-47.s390x", "3WS:krb5-debuginfo-0:1.2.7-47.x86_64", "3WS:krb5-devel-0:1.2.7-47.i386", "3WS:krb5-devel-0:1.2.7-47.ia64", "3WS:krb5-devel-0:1.2.7-47.ppc", "3WS:krb5-devel-0:1.2.7-47.s390", "3WS:krb5-devel-0:1.2.7-47.s390x", "3WS:krb5-devel-0:1.2.7-47.x86_64", "3WS:krb5-libs-0:1.2.7-47.i386", "3WS:krb5-libs-0:1.2.7-47.ia64", "3WS:krb5-libs-0:1.2.7-47.ppc", "3WS:krb5-libs-0:1.2.7-47.ppc64", "3WS:krb5-libs-0:1.2.7-47.s390", "3WS:krb5-libs-0:1.2.7-47.s390x", "3WS:krb5-libs-0:1.2.7-47.x86_64", "3WS:krb5-server-0:1.2.7-47.i386", "3WS:krb5-server-0:1.2.7-47.ia64", "3WS:krb5-server-0:1.2.7-47.ppc", "3WS:krb5-server-0:1.2.7-47.s390", "3WS:krb5-server-0:1.2.7-47.s390x", "3WS:krb5-server-0:1.2.7-47.x86_64", "3WS:krb5-workstation-0:1.2.7-47.i386", "3WS:krb5-workstation-0:1.2.7-47.ia64", "3WS:krb5-workstation-0:1.2.7-47.ppc", "3WS:krb5-workstation-0:1.2.7-47.s390", "3WS:krb5-workstation-0:1.2.7-47.s390x", "3WS:krb5-workstation-0:1.2.7-47.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:562" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
gsd-2005-0488
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2005-0488", "description": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.", "id": "GSD-2005-0488", "references": [ "https://www.suse.com/security/cve/CVE-2005-0488.html", "https://access.redhat.com/errata/RHSA-2005:562", "https://access.redhat.com/errata/RHSA-2005:504" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-0488" ], "details": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.", "id": "GSD-2005-0488", "modified": "2023-12-13T01:20:08.501799Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "RHSA-2005:504", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-504.html" }, { "name": "1014203", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014203" }, { "name": "13940", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13940" }, { "name": "57755", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "VU#800829", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/800829" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "RHSA-2005:562", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-562.html" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "oval:org.mitre.oval:def:11373", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373" }, { "name": "101665", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "oval:org.mitre.oval:def:1139", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139" }, { "name": "20050614 Multiple Vendor Telnet Client Information Disclosure Vulnerability", "refsource": "IDEFENSE", "url": "http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities" }, { "name": "17135", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17135" }, { "name": "57761", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "101671", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "SUSE-SR:2005:016", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0488" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "20050614 Multiple Vendor Telnet Client Information Disclosure Vulnerability", "refsource": "IDEFENSE", "tags": [ "Vendor Advisory" ], "url": "http://idefense.com/application/poi/display?id=260\u0026type=vulnerabilities" }, { "name": "57755", "refsource": "SUNALERT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "57761", "refsource": "SUNALERT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "VU#800829", "refsource": "CERT-VN", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/800829" }, { "name": "RHSA-2005:504", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-504.html" }, { "name": "SUSE-SR:2005:016", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html" }, { "name": "1014203", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1014203" }, { "name": "RHSA-2005:562", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-562.html" }, { "name": "17135", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17135" }, { "name": "101671", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "101665", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "21253", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21253" }, { "name": "13940", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/13940" }, { "name": "19289", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "oval:org.mitre.oval:def:1139", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1139" }, { "name": "oval:org.mitre.oval:def:11373", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11373" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2020-01-21T15:45Z", "publishedDate": "2005-06-14T04:00Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.