Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-0433 (GCVE-0-2010-0433)
Vulnerability from cvelistv5
- n/a
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:52:17.351Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2010-0916",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0916"
          },
          {
            "name": "42724",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42724"
          },
          {
            "name": "39461",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39461"
          },
          {
            "name": "oval:org.mitre.oval:def:9856",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
          },
          {
            "name": "FEDORA-2010-5357",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
          },
          {
            "name": "HPSBUX02531",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
          },
          {
            "name": "oval:org.mitre.oval:def:12260",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260"
          },
          {
            "name": "[oss-security] 20100303 OpenSSL (with KRB5) remote crash - CVE-2010-0433",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/03/03/5"
          },
          {
            "name": "[dovecot] 20100219 segfault - (imap|pop3)-login during nessus scan",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html"
          },
          {
            "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
          },
          {
            "name": "ADV-2010-0839",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0839"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.openssl.org/chngview?cn=19374"
          },
          {
            "name": "SSRT100108",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
          },
          {
            "name": "MDVSA-2010:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
          },
          {
            "name": "HPSBUX02517",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
          },
          {
            "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
          },
          {
            "name": "39932",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39932"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.openssl.org/news/changelog.html"
          },
          {
            "name": "ADV-2010-0933",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0933"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
          },
          {
            "name": "SSRT100058",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
          },
          {
            "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
          },
          {
            "name": "43311",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43311"
          },
          {
            "name": "ADV-2010-1216",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1216"
          },
          {
            "name": "oval:org.mitre.oval:def:6718",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718"
          },
          {
            "name": "42733",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42733"
          },
          {
            "name": "FEDORA-2010-5744",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-03-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "ADV-2010-0916",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0916"
        },
        {
          "name": "42724",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42724"
        },
        {
          "name": "39461",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39461"
        },
        {
          "name": "oval:org.mitre.oval:def:9856",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
        },
        {
          "name": "FEDORA-2010-5357",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
        },
        {
          "name": "HPSBUX02531",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
        },
        {
          "name": "oval:org.mitre.oval:def:12260",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260"
        },
        {
          "name": "[oss-security] 20100303 OpenSSL (with KRB5) remote crash - CVE-2010-0433",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/03/03/5"
        },
        {
          "name": "[dovecot] 20100219 segfault - (imap|pop3)-login during nessus scan",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html"
        },
        {
          "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
        },
        {
          "name": "ADV-2010-0839",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0839"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.openssl.org/chngview?cn=19374"
        },
        {
          "name": "SSRT100108",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
        },
        {
          "name": "MDVSA-2010:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
        },
        {
          "name": "HPSBUX02517",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
        },
        {
          "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
        },
        {
          "name": "39932",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39932"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.openssl.org/news/changelog.html"
        },
        {
          "name": "ADV-2010-0933",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0933"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
        },
        {
          "name": "SSRT100058",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
        },
        {
          "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
        },
        {
          "name": "43311",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43311"
        },
        {
          "name": "ADV-2010-1216",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1216"
        },
        {
          "name": "oval:org.mitre.oval:def:6718",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718"
        },
        {
          "name": "42733",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42733"
        },
        {
          "name": "FEDORA-2010-5744",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-0433",
    "datePublished": "2010-03-05T19:00:00",
    "dateReserved": "2010-01-27T00:00:00",
    "dateUpdated": "2024-08-07T00:52:17.351Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2010-0433\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-03-05T19:30:00.547\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.\"},{\"lang\":\"es\",\"value\":\"La funcion kssl_keytab_is_available en ssl/kssl.c en OpenSSL before v0.9.8n, cuando Kerberos esta activo pero los ficheros de configuracion de Kerberos no pueden ser abiertos, no comprueba adecuadamente cierto valor de retorno, lo que permite a atacantes remotos producir una denegacion de servicio (desreferencia a puntero nulo y caida de demonio) a traves de la negociacion del cifrado SSL, lo que se demuestra mediante la instalacion chroot de Dovecot o stunnel sin los ficheros de configuracion de Kerberos dentro de chroot.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.9.8m\",\"matchCriteriaId\":\"D2DC14B4-BFB1-4F37-9A6D-1488C394F500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4E446D-B9D3-45F2-9722-B41FA14A6C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4EA988-FC80-4170-8933-7C6663731981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F8F53B-24A1-4877-B16E-F1917C4E4E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75D3ACD5-905F-42BB-BE1A-8382E9D823BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766EA6F2-7FA4-4713-9859-9971CCD2FDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB38AEA-BAF0-4920-9A71-747C24444770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F33EA2B-DE15-4695-A383-7A337AC38908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261EE631-AB43-44FE-B02A-DFAAB8D35927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0E0BBF-D0BE-41A7-B9BB-C28F01000BC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1365ED-4651-4AB2-A64B-43782EA2F0E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC82690C-DCED-47BA-AA93-4D0C9E95B806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B90ED1-DAB4-4239-8AD8-87E8D568D5D2\"}]}]}],\"references\":[{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://cvs.openssl.org/chngview?cn=19374\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/39461\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/39932\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/42724\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/42733\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43311\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:076\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openssl.org/news/changelog.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/03/03/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0839\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0916\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0933\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1216\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=567711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=569774\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA50\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://cvs.openssl.org/chngview?cn=19374\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/39461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/39932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:076\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openssl.org/news/changelog.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/03/03/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0839\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0916\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=567711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=569774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA50\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}
  CERTA-2010-AVI-627
Vulnerability from certfr_avis
De nombreuses vulnérabilités, liées à l'utilisation de versions anciennes du code OpenSSL, affectent Blue Coat Reporter. Les plus dommageables permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
De nombreuses vulnérabilités, liées à l'utilisation de versions anciennes du code OpenSSL, affectent Blue Coat Reporter. Les plus dommageables permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Solution
Pour la version 9, la révision 9.2.4.1 remédie à ces vulnérabilités. Le correctif de la version 8 n'est pas encore disponible.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Blue Coat Reporter, versions 8.x et 9.x.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eBlue Coat Reporter, versions 8.x et  9.x.\u003c/p\u003e",
  "content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s, li\u00e9es \u00e0 l\u0027utilisation de versions\nanciennes du code OpenSSL, affectent Blue Coat Reporter. Les plus\ndommageables permettent \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n\n## Solution\n\nPour la version 9, la r\u00e9vision 9.2.4.1 rem\u00e9die \u00e0 ces vuln\u00e9rabilit\u00e9s. Le\ncorrectif de la version 8 n\u0027est pas encore disponible.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2008-1678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1678"
    },
    {
      "name": "CVE-2010-0433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
    },
    {
      "name": "CVE-2010-0742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0742"
    },
    {
      "name": "CVE-2009-0789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0789"
    },
    {
      "name": "CVE-2009-1379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1379"
    },
    {
      "name": "CVE-2009-3555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
    },
    {
      "name": "CVE-2009-0591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0591"
    },
    {
      "name": "CVE-2009-1378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1378"
    },
    {
      "name": "CVE-2009-1377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1377"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2010-0740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0740"
    },
    {
      "name": "CVE-2009-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0590"
    },
    {
      "name": "CVE-2009-4355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4355"
    }
  ],
  "initial_release_date": "2010-12-23T00:00:00",
  "last_revision_date": "2010-12-23T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-627",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-12-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De nombreuses vuln\u00e9rabilit\u00e9s, li\u00e9es \u00e0 l\u0027utilisation de versions\nanciennes du code OpenSSL, affectent Blue Coat Reporter. Les plus\ndommageables permettent \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans Blue Coat Reporter",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA50 du 19 novembre 2010",
      "url": "http://kb.bluecoat.com/index?page=content\u0026id=SA50"
    }
  ]
}
  CERTA-2011-AVI-032
Vulnerability from certfr_avis
Plusieurs vulnérabilités sont présentes dans syslog-ng. Elles permettent de contourner la politique de sécurité ou de provoquer un déni de service à distance.
Description
Plusieurs vulnérabilités sont présentes dans syslog-ng.
L'une d'elles permet de contourner la politique de sécurité en raison d'un mauvais positionnement des droits d'accès sur des fichiers.
Les autres sont exploitables pour provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
syslog-ng Open Source Edition :
- versions 3.0.x antérieures à la version 3.0.10 ;
 - versions 3.1.x antérieures à la version 3.1.4 ;
 - versions 3.2.x antérieures à la version 3.2.2.
 
syslog-ng Premium Edition :
- versions 3.0.x antérieures à la version 3.0.6a ;
 - versions 3.2.x antérieures à la version 3.2.1a.
 
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003esyslog-ng Open Source Edition :  \u003cUL\u003e    \u003cLI\u003eversions 3.0.x ant\u00e9rieures \u00e0 la version 3.0.10 ;\u003c/LI\u003e    \u003cLI\u003eversions 3.1.x ant\u00e9rieures \u00e0 la version 3.1.4 ;\u003c/LI\u003e    \u003cLI\u003eversions 3.2.x ant\u00e9rieures \u00e0 la version 3.2.2.\u003c/LI\u003e  \u003c/UL\u003e  \u003cP\u003esyslog-ng Premium Edition :\u003c/P\u003e  \u003cUL\u003e    \u003cLI\u003eversions 3.0.x ant\u00e9rieures \u00e0 la version 3.0.6a ;\u003c/LI\u003e    \u003cLI\u003eversions 3.2.x ant\u00e9rieures \u00e0 la version 3.2.1a.\u003c/LI\u003e  \u003c/UL\u003e\u003c/p\u003e",
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans syslog-ng.\n\nL\u0027une d\u0027elles permet de contourner la politique de s\u00e9curit\u00e9 en raison\nd\u0027un mauvais positionnement des droits d\u0027acc\u00e8s sur des fichiers.\n\nLes autres sont exploitables pour provoquer un d\u00e9ni de service \u00e0\ndistance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-0433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
    },
    {
      "name": "CVE-2010-0742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0742"
    },
    {
      "name": "CVE-2011-0343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0343"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2010-0740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0740"
    },
    {
      "name": "CVE-2009-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0590"
    },
    {
      "name": "CVE-2010-3864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3864"
    },
    {
      "name": "CVE-2009-2409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
    }
  ],
  "initial_release_date": "2011-01-26T00:00:00",
  "last_revision_date": "2011-01-26T00:00:00",
  "links": [
    {
      "title": "Annonces des versions de syslog-ng du 14 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000103.html"
    },
    {
      "title": "Annonces des versions de syslog-ng du 14 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000104.html"
    },
    {
      "title": "Annonces des versions de syslog-ng du 16 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000105.html"
    },
    {
      "title": "Annonces des versions de syslog-ng du 07 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
    },
    {
      "title": "Annonces des versions de syslog-ng du 07 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
    }
  ],
  "reference": "CERTA-2011-AVI-032",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2011-01-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans syslog-ng. Elles permettent\nde contourner la politique de s\u00e9curit\u00e9 ou de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans syslog-ng",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Annonces des versions de syslog-ng des 07, 14 et 16 janvier 2011",
      "url": null
    }
  ]
}
  CERTA-2010-AVI-461
Vulnerability from certfr_avis
De nombreuses vulnérabilités affectant différents logiciels inclus dans VMware ESX Console OS ont été corrigées.
Description
Plusieurs logiciels vulnérables inclus dans VMware ESX Console OS ont été mis à jour par l'éditeur :
- le composant NSS_db est mis à jour pour corriger une vulnérabilité permettant à un utilisateur malveillant d'accéder à des données confidentielles (CVE-2010-0826) ;
 - une mise à jour du composant OpenLDAP corrige un erreur dans la gestion du Common Name d'un certificat X.509, qui permet une attaque du type « homme au milieu » (CVE-2009-3767) ;
 - la bibliothèque libcurl est mise à jour afin de corriger une vulnérabilité permettant à un attaquant d'effectuer à distance un déni de service par arrêt inopiné (CVE-2010-0734) ;
 - le logiciel sudo est mis à jour pour corriger une erreur concernant la gestion d'une variable d'environnement permettant à un utilisateur malveillant d'élever ses privilèges (CVE-2010-1646) ;
 - une mise à jour groupée des composants OpenSSL, GnuTLS, NSS et NSPR corrige différentes vulnérabilités permettant entre autres un déni de service et l'élévation de privilèges (CVE-2009-3555, CVE-2009-2409, CVE-2009-3245 et CVE-2010-0433).
 
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
VMware ESX 4.0 Console OS (COS).
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eVMware ESX 4.0 Console OS (COS).\u003c/p\u003e",
  "content": "## Description\n\nPlusieurs logiciels vuln\u00e9rables inclus dans VMware ESX Console OS ont\n\u00e9t\u00e9 mis \u00e0 jour par l\u0027\u00e9diteur :\n\n-   le composant NSS_db est mis \u00e0 jour pour corriger une vuln\u00e9rabilit\u00e9\n    permettant \u00e0 un utilisateur malveillant d\u0027acc\u00e9der \u00e0 des donn\u00e9es\n    confidentielles (CVE-2010-0826) ;\n-   une mise \u00e0 jour du composant OpenLDAP corrige un erreur dans la\n    gestion du Common Name d\u0027un certificat X.509, qui permet une attaque\n    du type \u00ab homme au milieu \u00bb (CVE-2009-3767) ;\n-   la biblioth\u00e8que libcurl est mise \u00e0 jour afin de corriger une\n    vuln\u00e9rabilit\u00e9 permettant \u00e0 un attaquant d\u0027effectuer \u00e0 distance un\n    d\u00e9ni de service par arr\u00eat inopin\u00e9 (CVE-2010-0734) ;\n-   le logiciel sudo est mis \u00e0 jour pour corriger une erreur concernant\n    la gestion d\u0027une variable d\u0027environnement permettant \u00e0 un\n    utilisateur malveillant d\u0027\u00e9lever ses privil\u00e8ges (CVE-2010-1646) ;\n-   une mise \u00e0 jour group\u00e9e des composants OpenSSL, GnuTLS, NSS et NSPR\n    corrige diff\u00e9rentes vuln\u00e9rabilit\u00e9s permettant entre autres un d\u00e9ni\n    de service et l\u0027\u00e9l\u00e9vation de privil\u00e8ges (CVE-2009-3555,\n    CVE-2009-2409, CVE-2009-3245 et CVE-2010-0433).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-0433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
    },
    {
      "name": "CVE-2010-0826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0826"
    },
    {
      "name": "CVE-2010-0734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0734"
    },
    {
      "name": "CVE-2009-3767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3767"
    },
    {
      "name": "CVE-2010-1646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1646"
    },
    {
      "name": "CVE-2009-3555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2009-2409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
    }
  ],
  "initial_release_date": "2010-10-01T00:00:00",
  "last_revision_date": "2010-10-01T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-461",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-10-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De nombreuses vuln\u00e9rabilit\u00e9s affectant diff\u00e9rents logiciels inclus dans\n\u003cspan class=\"textit\"\u003eVMware ESX Console OS\u003c/span\u003e ont \u00e9t\u00e9 corrig\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX Server",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMSA-2010-0015 du 30 septembre 2010",
      "url": "http://lists.vmware.com/pipermail/security-announce/2010/000106.html"
    }
  ]
}
  rhsa-2010_0162
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw by implementing the\nTLS Renegotiation Indication Extension, as defined in RFC 5746.\n(CVE-2009-3555)\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nA missing return value check flaw was discovered in OpenSSL, that could\npossibly cause OpenSSL to call a Kerberos library function with invalid\narguments, resulting in a NULL pointer dereference crash in the MIT\nKerberos library. In certain configurations, a remote attacker could use\nthis flaw to crash a TLS/SSL server using OpenSSL by requesting Kerberos\ncipher suites during the TLS handshake. (CVE-2010-0433)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0162",
        "url": "https://access.redhat.com/errata/RHSA-2010:0162"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "567711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
      },
      {
        "category": "external",
        "summary": "569774",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0162.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2024-11-22T03:16:27+00:00",
      "generator": {
        "date": "2024-11-22T03:16:27+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0162",
      "initial_release_date": "2010-03-25T08:52:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T08:52:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T04:52:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:16:27+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                  "product_id": "5Client-Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-0433",
      "discovery_date": "2010-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "569774"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: crash caused by a missing krb5_sname_to_principal() return value check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "RHBZ#569774",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0433",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: crash caused by a missing krb5_sname_to_principal() return value check"
    }
  ]
}
  RHSA-2010:0162
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw by implementing the\nTLS Renegotiation Indication Extension, as defined in RFC 5746.\n(CVE-2009-3555)\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nA missing return value check flaw was discovered in OpenSSL, that could\npossibly cause OpenSSL to call a Kerberos library function with invalid\narguments, resulting in a NULL pointer dereference crash in the MIT\nKerberos library. In certain configurations, a remote attacker could use\nthis flaw to crash a TLS/SSL server using OpenSSL by requesting Kerberos\ncipher suites during the TLS handshake. (CVE-2010-0433)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0162",
        "url": "https://access.redhat.com/errata/RHSA-2010:0162"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "567711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
      },
      {
        "category": "external",
        "summary": "569774",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0162.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:29:02+00:00",
      "generator": {
        "date": "2025-10-09T13:29:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0162",
      "initial_release_date": "2010-03-25T08:52:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T08:52:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T04:52:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:29:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                  "product_id": "5Client-Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-0433",
      "discovery_date": "2010-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "569774"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: crash caused by a missing krb5_sname_to_principal() return value check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "RHBZ#569774",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0433",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: crash caused by a missing krb5_sname_to_principal() return value check"
    }
  ]
}
  rhsa-2010:0162
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw by implementing the\nTLS Renegotiation Indication Extension, as defined in RFC 5746.\n(CVE-2009-3555)\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nA missing return value check flaw was discovered in OpenSSL, that could\npossibly cause OpenSSL to call a Kerberos library function with invalid\narguments, resulting in a NULL pointer dereference crash in the MIT\nKerberos library. In certain configurations, a remote attacker could use\nthis flaw to crash a TLS/SSL server using OpenSSL by requesting Kerberos\ncipher suites during the TLS handshake. (CVE-2010-0433)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0162",
        "url": "https://access.redhat.com/errata/RHSA-2010:0162"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "567711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
      },
      {
        "category": "external",
        "summary": "569774",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0162.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:29:02+00:00",
      "generator": {
        "date": "2025-10-09T13:29:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0162",
      "initial_release_date": "2010-03-25T08:52:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T08:52:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T04:52:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:29:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                  "product_id": "5Client-Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-0433",
      "discovery_date": "2010-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "569774"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: crash caused by a missing krb5_sname_to_principal() return value check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "RHBZ#569774",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0433",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: crash caused by a missing krb5_sname_to_principal() return value check"
    }
  ]
}
  fkie_cve-2010-0433
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc | ||
| secalert@redhat.com | http://cvs.openssl.org/chngview?cn=19374 | ||
| secalert@redhat.com | http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7 | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html | ||
| secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=127128920008563&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=127557640302499&w=2 | ||
| secalert@redhat.com | http://secunia.com/advisories/39461 | ||
| secalert@redhat.com | http://secunia.com/advisories/39932 | ||
| secalert@redhat.com | http://secunia.com/advisories/42724 | ||
| secalert@redhat.com | http://secunia.com/advisories/42733 | ||
| secalert@redhat.com | http://secunia.com/advisories/43311 | ||
| secalert@redhat.com | http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:076 | ||
| secalert@redhat.com | http://www.openssl.org/news/changelog.html | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/03/03/5 | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/516397/100/0/threaded | ||
| secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2011-0003.html | ||
| secalert@redhat.com | http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/0839 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/0916 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/0933 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/1216 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=567711 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=569774 | ||
| secalert@redhat.com | https://kb.bluecoat.com/index?page=content&id=SA50 | ||
| secalert@redhat.com | https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html | ||
| secalert@redhat.com | https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://cvs.openssl.org/chngview?cn=19374 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127128920008563&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127557640302499&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39461 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39932 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42724 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42733 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43311 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:076 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openssl.org/news/changelog.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/03/03/5 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516397/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2011-0003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0839 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0916 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0933 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1216 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=567711 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=569774 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.bluecoat.com/index?page=content&id=SA50 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856 | 
| Vendor | Product | Version | |
|---|---|---|---|
| openssl | openssl | * | |
| openssl | openssl | 0.9.8 | |
| openssl | openssl | 0.9.8a | |
| openssl | openssl | 0.9.8b | |
| openssl | openssl | 0.9.8c | |
| openssl | openssl | 0.9.8d | |
| openssl | openssl | 0.9.8e | |
| openssl | openssl | 0.9.8f | |
| openssl | openssl | 0.9.8g | |
| openssl | openssl | 0.9.8h | |
| openssl | openssl | 0.9.8i | |
| openssl | openssl | 0.9.8j | |
| openssl | openssl | 0.9.8k | |
| openssl | openssl | 0.9.8l | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DC14B4-BFB1-4F37-9A6D-1488C394F500",
              "versionEndIncluding": "0.9.8m",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A4E446D-B9D3-45F2-9722-B41FA14A6C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF4EA988-FC80-4170-8933-7C6663731981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F8F53B-24A1-4877-B16E-F1917C4E4E81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
              "matchCriteriaId": "75D3ACD5-905F-42BB-BE1A-8382E9D823BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
              "matchCriteriaId": "766EA6F2-7FA4-4713-9859-9971CCD2FDCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BB38AEA-BAF0-4920-9A71-747C24444770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F33EA2B-DE15-4695-A383-7A337AC38908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
              "matchCriteriaId": "261EE631-AB43-44FE-B02A-DFAAB8D35927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0E0BBF-D0BE-41A7-B9BB-C28F01000BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1365ED-4651-4AB2-A64B-43782EA2F0E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC82690C-DCED-47BA-AA93-4D0C9E95B806",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*",
              "matchCriteriaId": "43B90ED1-DAB4-4239-8AD8-87E8D568D5D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot."
    },
    {
      "lang": "es",
      "value": "La funcion kssl_keytab_is_available en ssl/kssl.c en OpenSSL before v0.9.8n, cuando Kerberos esta activo pero los ficheros de configuracion de Kerberos no pueden ser abiertos, no comprueba adecuadamente cierto valor de retorno, lo que permite a atacantes remotos producir una denegacion de servicio (desreferencia a puntero nulo y caida de demonio) a traves de la negociacion del cifrado SSL, lo que se demuestra mediante la instalacion chroot de Dovecot o stunnel sin los ficheros de configuracion de Kerberos dentro de chroot."
    }
  ],
  "id": "CVE-2010-0433",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-03-05T19:30:00.547",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://cvs.openssl.org/chngview?cn=19374"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/39461"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/39932"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/42724"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/42733"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/43311"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openssl.org/news/changelog.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/03/03/5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/0839"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/0916"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/0933"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1216"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.openssl.org/chngview?cn=19374"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42733"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openssl.org/news/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/03/03/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-5gv7-x3p9-2mf6
Vulnerability from github
The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
{
  "affected": [],
  "aliases": [
    "CVE-2010-0433"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2010-03-05T19:30:00Z",
    "severity": "MODERATE"
  },
  "details": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
  "id": "GHSA-5gv7-x3p9-2mf6",
  "modified": "2022-05-02T06:12:42Z",
  "published": "2022-05-02T06:12:42Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
    },
    {
      "type": "WEB",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
    },
    {
      "type": "WEB",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856"
    },
    {
      "type": "WEB",
      "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
    },
    {
      "type": "WEB",
      "url": "http://cvs.openssl.org/chngview?cn=19374"
    },
    {
      "type": "WEB",
      "url": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7"
    },
    {
      "type": "WEB",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/39461"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/39932"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/42724"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/42733"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/43311"
    },
    {
      "type": "WEB",
      "url": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html"
    },
    {
      "type": "WEB",
      "url": "http://www.mail-archive.com/dovecot@dovecot.org/msg26224.html"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
    },
    {
      "type": "WEB",
      "url": "http://www.openssl.org/news/changelog.html"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2010/03/03/5"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
    },
    {
      "type": "WEB",
      "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/0839"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/0916"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/0933"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/1216"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  gsd-2010-0433
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2010-0433",
    "description": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
    "id": "GSD-2010-0433",
    "references": [
      "https://www.suse.com/security/cve/CVE-2010-0433.html",
      "https://access.redhat.com/errata/RHSA-2010:0162",
      "https://linux.oracle.com/cve/CVE-2010-0433.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2010-0433"
      ],
      "details": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
      "id": "GSD-2010-0433",
      "modified": "2023-12-13T01:21:29.241525Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2010-0433",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://secunia.com/advisories/42724",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/42724"
          },
          {
            "name": "http://secunia.com/advisories/42733",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/42733"
          },
          {
            "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA50",
            "refsource": "MISC",
            "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
          },
          {
            "name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
          },
          {
            "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
            "refsource": "MISC",
            "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
          },
          {
            "name": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
          },
          {
            "name": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html",
            "refsource": "MISC",
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
          },
          {
            "name": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html",
            "refsource": "MISC",
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
          },
          {
            "name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
            "refsource": "MISC",
            "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
          },
          {
            "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html",
            "refsource": "MISC",
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
          },
          {
            "name": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2",
            "refsource": "MISC",
            "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
          },
          {
            "name": "http://secunia.com/advisories/39461",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/39461"
          },
          {
            "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076",
            "refsource": "MISC",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2010/0916",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2010/0916"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2010/0933",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2010/0933"
          },
          {
            "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc",
            "refsource": "MISC",
            "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
          },
          {
            "name": "http://cvs.openssl.org/chngview?cn=19374",
            "refsource": "MISC",
            "url": "http://cvs.openssl.org/chngview?cn=19374"
          },
          {
            "name": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7",
            "refsource": "MISC",
            "url": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7"
          },
          {
            "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html",
            "refsource": "MISC",
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
          },
          {
            "name": "http://secunia.com/advisories/39932",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/39932"
          },
          {
            "name": "http://secunia.com/advisories/43311",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/43311"
          },
          {
            "name": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html",
            "refsource": "MISC",
            "url": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html"
          },
          {
            "name": "http://www.openssl.org/news/changelog.html",
            "refsource": "MISC",
            "url": "http://www.openssl.org/news/changelog.html"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2010/03/03/5",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2010/03/03/5"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2010/0839",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2010/0839"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2010/1216",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2010/1216"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=567711",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=569774",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.9.8m",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2010-0433"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=569774",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
            },
            {
              "name": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7",
              "refsource": "MISC",
              "tags": [],
              "url": "http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7"
            },
            {
              "name": "[oss-security] 20100303 OpenSSL (with KRB5) remote crash - CVE-2010-0433",
              "refsource": "MLIST",
              "tags": [],
              "url": "http://www.openwall.com/lists/oss-security/2010/03/03/5"
            },
            {
              "name": "http://cvs.openssl.org/chngview?cn=19374",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://cvs.openssl.org/chngview?cn=19374"
            },
            {
              "name": "http://www.openssl.org/news/changelog.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://www.openssl.org/news/changelog.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=567711",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
            },
            {
              "name": "ADV-2010-0839",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/0839"
            },
            {
              "name": "FEDORA-2010-5744",
              "refsource": "FEDORA",
              "tags": [],
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
            },
            {
              "name": "ADV-2010-0933",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/0933"
            },
            {
              "name": "MDVSA-2010:076",
              "refsource": "MANDRIVA",
              "tags": [],
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
            },
            {
              "name": "39461",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/39461"
            },
            {
              "name": "FEDORA-2010-5357",
              "refsource": "FEDORA",
              "tags": [],
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
            },
            {
              "name": "ADV-2010-0916",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/0916"
            },
            {
              "name": "ADV-2010-1216",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/1216"
            },
            {
              "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
            },
            {
              "name": "39932",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/39932"
            },
            {
              "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA50",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
            },
            {
              "name": "42733",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/42733"
            },
            {
              "name": "42724",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/42724"
            },
            {
              "name": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
            },
            {
              "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
            },
            {
              "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
            },
            {
              "name": "43311",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/43311"
            },
            {
              "name": "HPSBUX02517",
              "refsource": "HP",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
            },
            {
              "name": "HPSBUX02531",
              "refsource": "HP",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=127557640302499\u0026w=2"
            },
            {
              "name": "oval:org.mitre.oval:def:9856",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856"
            },
            {
              "name": "oval:org.mitre.oval:def:6718",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718"
            },
            {
              "name": "oval:org.mitre.oval:def:12260",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260"
            },
            {
              "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
            },
            {
              "name": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html",
              "refsource": "MISC",
              "tags": [],
              "url": "http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 8.6,
          "impactScore": 2.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2023-02-13T04:16Z",
      "publishedDate": "2010-03-05T19:30Z"
    }
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.