cve-2008-0411
Vulnerability from cvelistv5
Published
2008-02-28 21:00
Modified
2024-08-07 07:46
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29103", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29103" }, { "name": "USN-599-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-599-1" }, { "name": "GLSA-200803-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml" }, { "name": "29154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29154" }, { "name": "29196", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29196" }, { "name": "20080228 Ghostscript buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488946/100/0/threaded" }, { "name": "ADV-2008-0693", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0693/references" }, { "name": "29314", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29314" }, { "name": "20080228 rPSA-2008-0082-1 espgs", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488932/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:9557", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557" }, { "name": "29101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0082" }, { "name": "29112", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29112" }, { "name": "SUSE-SA:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html" }, { "name": "29147", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29147" }, { "name": "MDVSA-2008:055", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:055" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-2217" }, { "name": "29768", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29768" }, { "name": "1019511", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019511" }, { "name": "DSA-1510", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1510" }, { "name": "RHSA-2008:0155", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0155.html" }, { "name": "28017", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28017" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://scary.beasts.org/security/CESA-2008-001.html" }, { "name": "FEDORA-2008-1998", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html" }, { "name": "29135", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29135" }, { "name": "29169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29169" }, { "name": "SSA:2008-062-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.370633" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "29103", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29103" }, { "name": "USN-599-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-599-1" }, { "name": "GLSA-200803-14", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml" }, { "name": "29154", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29154" }, { "name": "29196", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29196" }, { "name": "20080228 Ghostscript buffer overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488946/100/0/threaded" }, { "name": "ADV-2008-0693", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0693/references" }, { "name": "29314", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29314" }, { "name": "20080228 rPSA-2008-0082-1 espgs", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488932/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:9557", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557" }, { "name": "29101", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0082" }, { "name": "29112", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29112" }, { "name": "SUSE-SA:2008:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html" }, { "name": "29147", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29147" }, { "name": "MDVSA-2008:055", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:055" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-2217" }, { "name": "29768", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29768" }, { "name": "1019511", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019511" }, { "name": "DSA-1510", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1510" }, { "name": "RHSA-2008:0155", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0155.html" }, { "name": "28017", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28017" }, { "tags": [ "x_refsource_MISC" ], "url": "http://scary.beasts.org/security/CESA-2008-001.html" }, { "name": "FEDORA-2008-1998", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html" }, { "name": "29135", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29135" }, { "name": "29169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29169" }, { "name": "SSA:2008-062-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.370633" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-0411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29103", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29103" }, { "name": "USN-599-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-599-1" }, { "name": "GLSA-200803-14", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml" }, { "name": "29154", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29154" }, { "name": "29196", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29196" }, { "name": "20080228 Ghostscript buffer overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488946/100/0/threaded" }, { "name": "ADV-2008-0693", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0693/references" }, { "name": "29314", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29314" }, { "name": "20080228 rPSA-2008-0082-1 espgs", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488932/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:9557", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557" }, { "name": "29101", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29101" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0082", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0082" }, { "name": "29112", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29112" }, { "name": "SUSE-SA:2008:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html" }, { "name": "29147", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29147" }, { "name": "MDVSA-2008:055", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:055" }, { "name": "https://issues.rpath.com/browse/RPL-2217", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-2217" }, { "name": "29768", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29768" }, { "name": "1019511", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019511" }, { "name": "DSA-1510", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1510" }, { "name": "RHSA-2008:0155", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0155.html" }, { "name": "28017", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28017" }, { "name": "http://scary.beasts.org/security/CESA-2008-001.html", "refsource": "MISC", "url": "http://scary.beasts.org/security/CESA-2008-001.html" }, { "name": "FEDORA-2008-1998", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html" }, { "name": "29135", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29135" }, { "name": "29169", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29169" }, { "name": "SSA:2008-062-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.370633" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-0411", "datePublished": "2008-02-28T21:00:00", "dateReserved": "2008-01-23T00:00:00", "dateUpdated": "2024-08-07T07:46:54.069Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-0411\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-02-28T21:44:00.000\",\"lastModified\":\"2024-11-21T00:42:01.810\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n zseticcspace de zicc.c en Ghostscript 8.61 y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo postscript (.ps) que contiene un array de Range (rango) largo en un operador .seticcspace.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"AF8AE8C4-810F-41AB-A251-5A2D4DD6884D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*\",\"matchCriteriaId\":\"5EACF214-FA27-44FF-A431-927AB79377A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*\",\"matchCriteriaId\":\"E2B58895-0E2A-4466-9CB2-0083349A83B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*\",\"matchCriteriaId\":\"03F8220A-9B1C-40AA-AEAB-F9A93225FBD5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*\",\"matchCriteriaId\":\"2311919C-7864-469D-B0F6-9B11D8D0A1C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*\",\"matchCriteriaId\":\"19876495-4C1A-487C-955A-C5AA46362A1F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*\",\"matchCriteriaId\":\"D75286DD-50BC-4B72-8AC8-E20730124DC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*\",\"matchCriteriaId\":\"1998C972-497E-4916-B50E-FB32303EEA8E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"A6CD3DD9-3A8A-4716-A2D1-136A790AFF94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*\",\"matchCriteriaId\":\"6CE2020A-4FB2-4FCD-8561-7BD147CD95EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"08E90AFA-C262-46D0-B60E-26B67C9602D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"F5114DA3-FBB9-47C4-857B-3212404DAD4E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"4D5F5A52-285E-4E7E-83B8-508079DBCEAE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*\",\"matchCriteriaId\":\"674BE2D9-009B-46C5-A071-CB10368B8D48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*\",\"matchCriteriaId\":\"703486E5-906B-4BDB-A046-28D4D73E3F03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*\",\"matchCriteriaId\":\"ABB5AC0D-2358-4C8E-99B5-2CE0A678F549\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*\",\"matchCriteriaId\":\"38B37184-BA88-44F1-AC9E-8B60C2419111\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*\",\"matchCriteriaId\":\"0D8C9247-3E18-4DD9-AF5B-B2996C76443F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*\",\"matchCriteriaId\":\"0EEA2CDD-7FCD-461E-90FC-CDB3C3992A32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*\",\"matchCriteriaId\":\"D7B877A8-5318-402E-8AE1-753E7419060F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*\",\"matchCriteriaId\":\"A3938420-087D-4D92-A2F8-EAE54D9837EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:*\",\"matchCriteriaId\":\"EFB8DE9F-2130-49E9-85EE-6793ED9FBEED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"10F42CF8-FB98-4AFC-96C5-FD7D442B0FA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02362C25-B373-4FB1-AF4A-2AFC7F7D4387\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:2007.0_x86_64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4784E4-24D1-4E22-B880-846F21F52F73\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D64247-F0A0-4984-84EA-B63FC901F002\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"316AA6EB-7191-479E-99D5-40DA79E340E7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB7AD2F3-451D-4F37-A6F3-DE676804BBA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"5FE8C9E7-15C3-4F89-8E54-C9691FAD4E4C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB0B27C-04EA-426F-9016-7406BACD91DF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F65351-C2DA-41C0-A3F9-1AE951E4386E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrakesoft_corporate_server:3.0_x86_64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8AA83A-C1D6-486F-A765-065E3BCAAC3F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrakesoft_corporate_server:4.0_x86_64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD9BC765-C645-417C-A01C-AD37AE9DC81E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8CB34E-02FE-4F90-9642-B56D3B3ACEF6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:desktop:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB2579A-2BC9-4E16-9641-248222301660\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*\",\"matchCriteriaId\":\"5833A489-D6DE-4D51-9E74-189CBC2E28CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:as_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421C0021-66EB-4F4C-9D79-6366A4702CC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:as_4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F23BD8DF-6E8E-4DF2-A700-8E050D967547\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:es_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0FE33D-756C-449F-B54C-8677C9AD002D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:es_4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF1F027-C9FF-4583-AB40-E0B757F9EE41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:ws_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EA8914F-DB6D-4C21-A727-8B94BE0424BF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:ws_4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EBE6E-482D-435D-851C-73EC301F0A26\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*\",\"matchCriteriaId\":\"AF3FB21C-AC0E-4F6C-B68A-9405E57ADCF0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop_workstation:5:*:client:*:*:*:*:*\",\"matchCriteriaId\":\"0E22A48D-9770-4BEC-BFA7-F9BD8C31AC44\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD12BC0-1E50-49C6-AD0D-8CE90F0E8449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:novell_linux_pos:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1197AF2-7BAE-4035-8C56-885CD12BDB6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:open_suse:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A876EFC5-50DC-4A6A-A9F2-24D8AC773E7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:open_suse:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D71E02A6-5F83-46EC-88C1-687E6EB88F5F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"F7446746-87B7-4BD3-AABF-1E0FAA8265AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10:sp1:enterprise_desktop:*:*:*:*:*\",\"matchCriteriaId\":\"C4F119BA-1FCA-41DF-B834-62F14CA8816E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10:sp1:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"26B6132C-4FF0-4359-B0A6-BBA4ED73E1D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10.1:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"84B05DB5-3BF9-4576-970B-A1701FC369AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10.1:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"F15CDDE2-BA9E-4B8D-8B01-21494360290E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"5B367EE1-EB53-4DC6-B154-FFA99060DA47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_open_enterprise_server:0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4B0E781-64D4-4C1B-A8DE-9EB9ECC7F0F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.61\",\"matchCriteriaId\":\"838F2E76-9050-499F-AE47-5EF3AB7104A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"AF8AE8C4-810F-41AB-A251-5A2D4DD6884D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*\",\"matchCriteriaId\":\"5EACF214-FA27-44FF-A431-927AB79377A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*\",\"matchCriteriaId\":\"E2B58895-0E2A-4466-9CB2-0083349A83B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*\",\"matchCriteriaId\":\"03F8220A-9B1C-40AA-AEAB-F9A93225FBD5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*\",\"matchCriteriaId\":\"2311919C-7864-469D-B0F6-9B11D8D0A1C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*\",\"matchCriteriaId\":\"19876495-4C1A-487C-955A-C5AA46362A1F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*\",\"matchCriteriaId\":\"D75286DD-50BC-4B72-8AC8-E20730124DC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*\",\"matchCriteriaId\":\"1998C972-497E-4916-B50E-FB32303EEA8E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"A6CD3DD9-3A8A-4716-A2D1-136A790AFF94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*\",\"matchCriteriaId\":\"6CE2020A-4FB2-4FCD-8561-7BD147CD95EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"08E90AFA-C262-46D0-B60E-26B67C9602D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"F5114DA3-FBB9-47C4-857B-3212404DAD4E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"4D5F5A52-285E-4E7E-83B8-508079DBCEAE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*\",\"matchCriteriaId\":\"674BE2D9-009B-46C5-A071-CB10368B8D48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*\",\"matchCriteriaId\":\"703486E5-906B-4BDB-A046-28D4D73E3F03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*\",\"matchCriteriaId\":\"ABB5AC0D-2358-4C8E-99B5-2CE0A678F549\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*\",\"matchCriteriaId\":\"38B37184-BA88-44F1-AC9E-8B60C2419111\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*\",\"matchCriteriaId\":\"0D8C9247-3E18-4DD9-AF5B-B2996C76443F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*\",\"matchCriteriaId\":\"0EEA2CDD-7FCD-461E-90FC-CDB3C3992A32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*\",\"matchCriteriaId\":\"D7B877A8-5318-402E-8AE1-753E7419060F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*\",\"matchCriteriaId\":\"A3938420-087D-4D92-A2F8-EAE54D9837EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:*\",\"matchCriteriaId\":\"EFB8DE9F-2130-49E9-85EE-6793ED9FBEED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"10F42CF8-FB98-4AFC-96C5-FD7D442B0FA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ghostscript:ghostscript:0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E68242D-465A-443F-9D25-BE57F9080394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9877DC36-5151-43C9-864D-BE7939A0304D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F9F0F0A-E413-42CC-B67D-434EC6A92543\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://scary.beasts.org/security/CESA-2008-001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/29101\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29103\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29112\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29135\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29147\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29154\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29169\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29196\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29314\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29768\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.370633\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0082\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1510\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:055\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0155.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://www.securityfocus.com/archive/1/488932/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/488946/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/28017\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1019511\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-599-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0693/references\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-2217\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://scary.beasts.org/security/CESA-2008-001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/29101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29103\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29147\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29154\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29314\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://secunia.com/advisories/29768\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.370633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2008-0082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1510\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0155.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"URL Repurposed\"]},{\"url\":\"http://www.securityfocus.com/archive/1/488932/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/488946/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/28017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1019511\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-599-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0693/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-2217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.